The plugin does not escape the ‘tab’ GET parameter before outputting it back in an attribute, leading to a reflected Cross-Site Scripting issue which will be executed in the context of a logged in administrator
View the template here CVE-2021-24409.yaml
References:
https://nvd.nist.gov/vuln/detail/CVE-2021-24409