The plugin does not validate and escape some of its query parameters before outputting them back in a page/post via an embedded shortcode, which could allow an attacker to inject javascript into into the site via a crafted URL.
Create a page βTestβ containing the shortcode β[loancomparison]β, then visit the page like this: https://example.com/test/?amount="//>