The plugin does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against any high privilege users such as admin
https://example.com/?SPAI_VJS=</script><img src%3D1 onerror%3Dalert(/XSS/);>