Hello,
1. Reflected Cross-Site Scripting (XSS)
Authenticated users (like subscribers) can inject html/js code (there is no CSRF protection).
Method: GET
Vulnerable parameters: postId
Example PHP callstack:
mic_ajax_editor_window [/manual-image-crop/manual-image-crop.php:50]
ManualImageCropEditorWindow::renderWindow [/manual-image-crop/lib/ManualImageCropEditorWindow.php:77]
Verification: