The plugin does not sanitise and escape its settings, allowing high privilege users such as admin to perform cross-Site Scripting attacks even when the unfiltered_html capability is disallowed.
Put the following payload in the “Client ID” settings: "/>
CPE | Name | Operator | Version |
---|---|---|---|
company-updates-for-linkedin | eq | * |