The plugin does not perform proper sanitization of gallery information, leading to a Stored Cross-Site Scription vulnerability. The attacker must have at least the privileges of the Author role.
1. Go to Galleries > Add New.
2. Click "Add Media" and choose or upload an image.
3. When publishing (or updating) the Gallery, intercept the request and change the POST parameter with name `gllr_image_text%5B13%5D` (note the `13` is an ID and will be different in each case). Set the value to `" onload="alert(/XSS/)" e="`.
4. Load the Gallery on the frontend and see the alert.
The XSS can also be attained with the same payload in the `gllr_image_alt_tag%5B13%5D` parameter.