The plugin does not sanitise and escape its settings, allowing high privilege users such as admin to perform Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed.
Put the following payload in the "Duplicate Post Suffix" or "Duplicate Link Text" settings: "><script>alert(/XSS/)</script>