The plugin does not escape the 'tab' GET parameter before outputting it back in an attribute, leading to a reflected Cross-Site Scripting issue which will be executed in the context of a logged in administrator
id: CVE-2021-24409
info:
name: Prismatic < 2.8 - Cross-Site Scripting
author: Harsh
severity:
...