The vulnerability you’re linking to was fixed in version 2.4, in early 2011.
The fact that you installed this plugin last weekend, and soon after realized you have been compromised is anecdotal at best. If you have any confirmed exploits through this plugin, contact the author or [email protected] directly with details.
Note that the entire Internet is currently experiencing a significantly heightened wave of attacks against Apache – the web server that you’re likely using on your site. There have been consequently been many more plugins being reported in these past few weeks, blamed as being the cause.
Again, if you have confirmation that this plugin is actually your culprit, that’s one thing, and you should definitely alert the appropriate parties of the specifics, but the fact that you recently enabled this plugin and shortly afterwards have discovered your site compromised is far from sufficient proof.
Cheers