The plugin does not sanitise and escape the form’s ‘Email to’ field , which could allow high privilege users to perform Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed
Create/edit a form and put the following payload in the 'E-mail To' field: "><img src onerror=alert(/XSS/)>
The XSS will be triggered when editing the form