The plugin does not sanitise some of its parameters, which could allow low privilege users such as author to perform XSS attacks against frontend and backend users when viewing the related event/s
Create an event with the following payload in the description of a timeslot: <img src onerror=alert(/XSS/)>
The XSS will be executed in the frontend and backend when viewing the related event