The plugin does not have capability checks and does not sanitise or escape the cg-search-user-name-original parameter before using it in a SQL statement when exporting users from a gallery, which could allow unauthenticated to perform SQL injections attacks, as well as get the list of all users registered on the blog, including their username and email address.
View the template here CVE-2021-24915.yaml
References:
https://nvd.nist.gov/vuln/detail/CVE-2021-24915