The plugin does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against any high privilege users such as admin
https://example.com/?SPAI_VJS=%3C/script%3E%3Cimg%20src%3D1%20onerror%3Dalert(/XSS/);%3E