The plugin does not sanitise and escape its settings, allowing high privilege users such as admin to perform cross-Site Scripting attacks even when the unfiltered_html capability is disallowed.
Put the following payload in the "Notes placeholder" settings of the plugin: </textarea><script>alert(/XSS/)</script>