The plugin does not properly sanitise and escape a parameter before using it in a SQL statement, leading to a SQL injection exploitable by high privilege users such as admin.
1. View the plugin settings and intercept the request and add the payload `sortOrder=ASC%2c(select*from(select(sleep(20)))a`
2. See the SQLi