The gAppointments WordPress plugin before 1.10.0 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against admin
https://wpscan.com/vulnerability/0b3c83ad-d490-4ca3-8589-39163ea5e24b