The plugin does not sanitise and escape its API Key settings before outputting it in an attribute, leading to a Stored Cross-Site Scripting issue even when the unfiltered_html capability is disallowed
Put the following payload in the API Key settings of the plugin: '></script><script>alert(/XSS/)</script>
The XSS will be triggered when viewing the settings again, as well as all frontend pages