The plugin does not sanitise and escape the employee_name parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin.
As an admin user, visit the following URL on the site: /wp-admin/admin.php?page=erp-hr§ion;=leave&employee;_name=employee123"+style%3Danimation-name%3Arotation+onanimationstart%3Dalert(%2FXSS%2F)%2F%2F Click on the “Filter Leave Requests” button to trigger the XSS.