The plugin does not sanitise and escape its settings, allowing high privilege users such as admin to perform cross-Site Scripting attacks even when the unfiltered_html capability is disallowed.
In the settings of the plugin, add the following payload to the text before the form:
CPE | Name | Operator | Version |
---|---|---|---|
comment-form | lt | 1.2.1 |