The plugin does not escape some of its form fields before outputting them in attributes, which could allow high privilege users to perform Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed
Create/Edit a form and put the following payload in a Filed Name or Default Value; "style=animation-name:rotation onanimationstart=alert(/XSS/)// yo="