Most Exploitable CVEs - EPSS Rankings

CVEs ranked by EPSS (Exploit Prediction Scoring System) probability. Higher scores mean a greater likelihood of exploitation in the wild within the next 30 days.

164
EPSS > 50%
156
CISA KEV Listed
35,468
CVEs with EPSS
0.7%
Avg EPSS Score
All Critical High Medium Low
Rank CVE ID EPSS Score Percentile CVSS Flags Summary
5051 CVE-2024-11173
0.23%
45.2th 6.5 An unhandled exception vulnerability in LibreChat allows attackers to crash the server, causing deni
5052 CVE-2024-13776
0.23%
45.1th 8.1 The ZoomSounds WordPress plugin has an authorization vulnerability that allows authenticated users w
5053 CVE-2025-9089
0.23%
45.2th 8.8 A stack-based buffer overflow vulnerability in Tenda AC20 routers allows remote attackers to execute
5054 CVE-2025-9087
0.23%
45.2th 8.8 This vulnerability allows remote attackers to execute arbitrary code on Tenda AC20 routers via a sta
5055 CVE-2025-6553
0.23%
45.2th 9.8 The Ovatheme Events Manager WordPress plugin allows unauthenticated attackers to upload arbitrary fi
5056 CVE-2025-10726
0.23%
45.2th 9.1 The WPRecovery WordPress plugin contains an unauthenticated SQL injection vulnerability that allows
5057 CVE-2025-0401
0.23%
45.1th 5.3 This critical path traversal vulnerability in the Reggie 1.0 application allows attackers to access
5058 CVE-2024-35365
0.23%
45th 8.8 CVE-2024-35365 is a double-free vulnerability in FFmpeg's audio stream initialization function that
5059 CVE-2024-56038
0.23%
45.1th 7.1 This reflected cross-site scripting (XSS) vulnerability in the SendSMS WordPress plugin allows attac
5060 CVE-2023-51336
0.23%
45.1th 8.8 CVE-2023-51336 is a CSV injection vulnerability in PHPJabbers Meeting Room Booking System v1.0 that
5061 CVE-2023-51333
0.23%
45.1th 8.8 PHPJabbers Cinema Booking System v1.0 has a CSV injection vulnerability that allows attackers to exe
5062 CVE-2024-37361
0.23%
45.1th 9.9 This vulnerability allows remote attackers to execute arbitrary code on Hitachi Vantara Pentaho Busi
5063 CVE-2025-24661
0.23%
45.1th 8.8 This vulnerability allows attackers to inject malicious objects through deserialization of untrusted
5064 CVE-2025-27095
0.23%
45.1th 4.3 This vulnerability allows attackers with low-privileged JumpServer accounts to manipulate Kubernetes
5065 CVE-2024-12391
0.23%
45.1th 6.5 This vulnerability allows attackers to cause a denial of service by providing specially crafted regu
5066 CVE-2025-26921
0.23%
45.1th 8.8 This vulnerability allows attackers to inject malicious objects through deserialization of untrusted
5067 CVE-2025-26967
0.23%
45.1th 8.8 This vulnerability allows attackers to inject malicious objects through deserialization of untrusted
5068 CVE-2025-1791
0.23%
45th 6.3 CVE-2025-1791 is a critical unrestricted file upload vulnerability in Zorlan SkyCaiji 2.9 that allow
5069 CVE-2025-39583
0.23%
45.1th 7.1 This CVE describes a Missing Authorization vulnerability in the BERTHA AI WordPress plugin that allo
5070 CVE-2025-3298
0.23%
45.1th 4.3 This vulnerability in SourceCodester Online Eyewear Shop 1.0 allows attackers to bypass access contr
5071 CVE-2025-31487
0.23%
45.1th 7.7 This vulnerability allows authenticated XWiki users to exploit the JIRA macro to read arbitrary loca
5072 CVE-2025-23254
0.23%
45.1th 8.8 This vulnerability in NVIDIA TensorRT-LLM allows attackers with local access to the TRTLLM server to
5073 CVE-2025-33050
0.23%
45.1th 7.5 A protection mechanism failure in Windows DHCP Server allows unauthorized attackers to cause denial
5074 CVE-2025-6260
0.23%
45.1th 9.8 This vulnerability allows unauthenticated attackers to reset user credentials on affected thermostat
5075 CVE-2025-52376
0.23%
45.1th 9.8 This authentication bypass vulnerability in Nexxt Solutions NCM-X1800 Mesh Router firmware allows at
5076 CVE-2025-9254
0.23%
45th 9.8 CVE-2025-9254 is a critical authentication bypass vulnerability in WebITR software developed by Unio
5077 CVE-2024-13996
0.23%
45th 9.8 Nagios XI versions before 2024R1.1.3 fail to invalidate existing user sessions when passwords are ch
5078 CVE-2025-34334
0.23%
45.1th 8.8 This vulnerability allows authenticated attackers to execute arbitrary commands with SYSTEM privileg
5079 CVE-2026-23837
0.23%
45th 9.8 CVE-2026-23837 is an authentication bypass vulnerability in MyTube that allows unauthenticated attac
5080 CVE-2025-13371
0.23%
45.1th 8.6 The MoneySpace WordPress plugin exposes full payment card details including CVV codes to unauthentic
5081 CVE-2025-55204
0.23%
45.1th 8.8 Muffon music streaming client versions before 2.3.0 have a one-click remote code execution vulnerabi
5082 CVE-2024-50698
0.23%
44.9th 9.8 A heap-based buffer overflow vulnerability in SunGrow WiNet-SV200 MQTT message processing allows att
5083 CVE-2024-13594
0.23%
44.9th 6.5 The Simple Downloads List WordPress plugin contains a SQL injection vulnerability in the 'neofix_sdl
5084 CVE-2018-25108
0.23%
45th 7.5 CVE-2018-25108 allows unauthenticated remote attackers to cause a denial-of-service (DoS) in affecte
5085 CVE-2025-22210
0.23%
44.9th 7.2 This SQL injection vulnerability in Hikashop for Joomla allows authenticated administrators to execu
5086 CVE-2025-0995
0.23%
44.9th 8.8 This is a use-after-free vulnerability in Chrome's V8 JavaScript engine that allows remote attackers
5087 CVE-2025-43928
0.23%
44.9th 5.8 Infodraw Media Relay Service 7.1.0.0 contains a path traversal vulnerability in its web server on po
5088 CVE-2025-4392
0.23%
44.9th 7.2 The Shared Files WordPress plugin allows unauthenticated attackers to upload HTML files containing m
5089 CVE-2025-8169
0.23%
45th 8.8 A critical buffer overflow vulnerability in D-Link DIR-513 routers allows remote attackers to execut
5090 CVE-2026-21881
0.23%
44.9th 9.1 This critical authentication bypass vulnerability in Kanboard allows attackers to impersonate any us
5091 CVE-2025-24030
0.22%
44.8th 7.1 This CVE allows authenticated Kubernetes cluster users to perform path traversal attacks against Env
5092 CVE-2024-57540
0.22%
44.9th 6.5 A buffer overflow vulnerability exists in Linksys E8450 routers where the 'action' field is copied t
5093 CVE-2023-28362
0.22%
44.9th 4.0 This vulnerability in Ruby on Rails allows attackers to inject malicious characters into redirect UR
5094 CVE-2025-23187
0.22%
44.8th 5.3 This vulnerability allows unauthenticated attackers to generate technical metadata in SAP systems vi
5095 CVE-2024-57067
0.22%
44.8th 7.5 CVE-2024-57067 is a prototype pollution vulnerability in dot-qs v0.2.0's lib.parse function that all
5096 CVE-2024-57066
0.22%
44.8th 7.5 This vulnerability allows attackers to perform prototype pollution in the lib.deep function of @ndho
5097 CVE-2024-57064
0.22%
44.8th 7.5 A prototype pollution vulnerability in the lib.setValue function of @syncfusion/ej2-spreadsheet vers
5098 CVE-2024-13617
0.22%
44.9th 8.6 The aoa-downloadable WordPress plugin through version 0.1.0 contains a path traversal vulnerability
5099 CVE-2025-30474
0.22%
44.8th 5.0 Apache Commons VFS versions before 2.10.0 can leak FTP passwords in error messages when file operati
5100 CVE-2024-10831
0.22%
44.8th 9.1 This vulnerability allows attackers to upload arbitrary files to any location on the server by explo

What is EPSS?

The Exploit Prediction Scoring System (EPSS) is a data-driven model developed by FIRST.org that estimates the probability a CVE will be exploited in the wild within the next 30 days. Unlike CVSS which measures severity, EPSS measures likelihood of exploitation — making it ideal for prioritizing which vulnerabilities to patch first.

Why EPSS matters: With thousands of CVEs published monthly, not all vulnerabilities are equally dangerous. EPSS helps security teams focus on the CVEs most likely to be actively exploited, rather than patching solely by CVSS score. A critical CVSS 9.8 vulnerability with 0.1% EPSS may be less urgent than a high CVSS 7.5 with 90% EPSS.

Prioritize by Exploit Risk

Scan your servers and see which vulnerabilities have the highest EPSS scores. Focus on what attackers are actually targeting.

Start Monitoring Free