Most Exploitable CVEs - EPSS Rankings
CVEs ranked by EPSS (Exploit Prediction Scoring System) probability. Higher scores mean a greater likelihood of exploitation in the wild within the next 30 days.
| Rank | CVE ID | EPSS Score | Percentile | CVSS | Flags | Summary |
|---|---|---|---|---|---|---|
| 5151 | CVE-2024-13189 |
|
44.6th | 7.3 | CVE-2024-13189 is a critical permission vulnerability in ZeroWdd myblog 1.0 that allows remote attac | |
| 5152 | CVE-2025-1682 |
|
44.6th | 8.8 | The Cardealer WordPress theme allows authenticated attackers with subscriber-level access to escalat | |
| 5153 | CVE-2024-57175 |
|
44.6th | 5.4 | A stored cross-site scripting (XSS) vulnerability in PHPGURUKUL Online Birth Certificate System v1.0 | |
| 5154 | CVE-2025-30291 |
|
44.6th | 5.5 | This CVE describes an information exposure vulnerability in Adobe ColdFusion that allows low-privile | |
| 5155 | CVE-2025-3074 |
|
44.6th | 5.4 | This vulnerability allows attackers to spoof download UI elements in Google Chrome, tricking users i | |
| 5156 | CVE-2025-3072 |
|
44.6th | 5.4 | This vulnerability allows attackers to spoof UI elements in Chrome's Custom Tabs feature by tricking | |
| 5157 | CVE-2025-46813 |
|
44.5th | 5.8 | This CVE describes a data leak vulnerability in Discourse where unauthenticated users could view pri | |
| 5158 | CVE-2025-48026 |
|
44.5th | 7.5 | An unauthenticated path traversal vulnerability in Mitel OpenScape Xpressions WebApl component allow | |
| 5159 | CVE-2025-33070 |
|
44.6th | 8.1 | CVE-2025-33070 is a privilege escalation vulnerability in Windows Netlogon service where uninitializ | |
| 5160 | CVE-2025-5853 |
|
44.6th | 8.8 | A critical stack-based buffer overflow vulnerability in Tenda AC6 routers allows remote attackers to | |
| 5161 | CVE-2025-5572 |
|
44.5th | 8.8 | A critical stack-based buffer overflow vulnerability in D-Link DCS-932L IP cameras allows remote att | |
| 5162 | CVE-2025-10773 |
|
44.6th | 8.8 | A stack-based buffer overflow vulnerability in the B-Link BL-AC2100 router's web management interfac | |
| 5163 | CVE-2025-58447 |
|
44.6th | 9.8 | CVE-2025-58447 is a critical heap-based buffer overflow vulnerability in rAthena MMORPG server's log | |
| 5164 | CVE-2025-13483 |
|
44.6th | N/A | SiRcom SMART Alert (SiSA) has an authentication bypass vulnerability that allows unauthenticated att | |
| 5165 | CVE-2026-23838 |
|
44.5th | N/A | Tandoor Recipes' default NixOS configuration exposes the SQLite database file externally when using | |
| 5166 | CVE-2024-55227 |
|
44.4th | 9.0 | This CVE describes a cross-site scripting (XSS) vulnerability in Dolibarr's Events/Agenda module tha | |
| 5167 | CVE-2025-2887 |
|
44.5th | 4.5 | This vulnerability in the tough library allows clients to fetch target files from incorrect sources | |
| 5168 | CVE-2025-2885 |
|
44.5th | 4.5 | This vulnerability in the tough library allows attackers to supply arbitrary version numbers in root | |
| 5169 | CVE-2025-29181 |
|
44.4th | 7.2 | FOXCMS versions up to 1.25 contain a SQL injection vulnerability in the admin panel's field manageme | |
| 5170 | CVE-2025-31221 |
|
44.5th | 7.5 | This CVE describes an integer overflow vulnerability in multiple Apple operating systems that could | |
| 5171 | CVE-2025-20282 |
|
44.4th | 10.0 | This critical vulnerability in Cisco ISE and ISE-PIC allows unauthenticated remote attackers to uplo | |
| 5172 | CVE-2025-24853 |
|
44.4th | 7.5 | CVE-2025-24853 is a cross-site scripting (XSS) vulnerability in Apache JSPWiki that allows attackers | |
| 5173 | CVE-2025-53506 |
|
44.4th | 7.5 | This vulnerability allows an attacker to cause a denial-of-service (DoS) condition in Apache Tomcat | |
| 5174 | CVE-2025-12104 |
|
44.5th | 9.8 | This vulnerability involves outdated UI dependencies in BLU-IC2 and BLU-IC4 devices that could allow | |
| 5175 | CVE-2025-10742 |
|
44.5th | 9.8 | The Truelysell Core WordPress plugin allows unauthenticated attackers to change user passwords, incl | |
| 5176 | CVE-2025-11444 |
|
44.5th | 8.8 | A buffer overflow vulnerability in TOTOLINK N600R routers allows remote attackers to execute arbitra | |
| 5177 | CVE-2025-13615 |
|
44.5th | 9.8 | This vulnerability in the StreamTube Core WordPress plugin allows unauthenticated attackers to chang | |
| 5178 | CVE-2025-42892 |
|
44.5th | 6.8 | This CVE describes an OS command injection vulnerability in SAP Business Connector that allows authe | |
| 5179 | CVE-2025-69601 |
|
44.5th | 6.5 | A directory traversal vulnerability in 66biolinks v44.0.0 allows attackers to write files outside in | |
| 5180 | CVE-2025-14463 |
|
44.4th | 5.3 | The Payment Button for PayPal WordPress plugin has an authentication bypass vulnerability that allow | |
| 5181 | CVE-2021-47816 |
|
44.5th | 8.8 | Thecus N4800Eco NAS Server Control Panel contains a command injection vulnerability that allows auth | |
| 5182 | CVE-2025-63560 |
|
44.5th | 7.5 | A vulnerability in KiloView Dual Channel 4k HDMI & 3G-SDI HEVC Video Encoder firmware allows remote | |
| 5183 | CVE-2025-27301 |
|
44.4th | 7.2 | This vulnerability allows attackers to inject malicious objects through deserialization of untrusted | |
| 5184 | CVE-2025-27300 |
|
44.4th | 7.2 | This vulnerability in the giuliopanda ADFO WordPress plugin allows attackers to inject malicious obj | |
| 5185 | CVE-2025-2562 |
|
44.4th | 5.4 | This vulnerability in Devolutions Remote Desktop Manager allows authenticated users to use stored pa | |
| 5186 | CVE-2024-13835 |
|
44.4th | 7.2 | The Post Meta Data Manager WordPress plugin allows authenticated attackers with Administrator access | |
| 5187 | CVE-2025-26885 |
|
44.4th | 7.2 | This vulnerability allows attackers to inject malicious objects through deserialization of untrusted | |
| 5188 | CVE-2025-21597 |
|
44.4th | 5.3 | An unauthenticated, logically adjacent BGP peer can cause a denial of service by triggering a crash | |
| 5189 | CVE-2025-5063 |
|
44.4th | 8.8 | This is a use-after-free vulnerability in Chrome's compositing engine that allows remote attackers t | |
| 5190 | CVE-2025-5158 |
|
44.4th | 4.3 | This CVE describes a path traversal vulnerability in H3C SecCenter SMP-E1114P02 that allows attacker | |
| 5191 | CVE-2025-6751 |
|
44.4th | 8.8 | A critical buffer overflow vulnerability in Linksys E8450 routers allows remote attackers to execute | |
| 5192 | CVE-2025-9146 |
|
44.4th | 6.6 | A cryptographic vulnerability in Linksys E5600 routers allows remote attackers to potentially compro | |
| 5193 | CVE-2025-60153 |
|
44.4th | 7.5 | This CVE describes a PHP Local File Inclusion vulnerability in the WordPress Subscribe To Unlock plu | |
| 5194 | CVE-2025-60150 |
|
44.4th | 7.5 | This vulnerability allows attackers to include local files on the server through improper filename c | |
| 5195 | CVE-2025-60126 |
|
44.4th | 8.8 | This CVE describes a PHP Local File Inclusion vulnerability in the WordPress Testimonial Slider plug | |
| 5196 | CVE-2025-59588 |
|
44.4th | 7.5 | This vulnerability allows attackers to include local files on the server through improper filename c | |
| 5197 | CVE-2025-58973 |
|
44.4th | 7.5 | This vulnerability allows attackers to include local PHP files through improper filename control in | |
| 5198 | CVE-2025-57925 |
|
44.4th | 7.5 | This vulnerability allows attackers to include local files on the server through improper filename c | |
| 5199 | CVE-2025-53450 |
|
44.4th | 7.5 | This vulnerability allows attackers to include local files on the server through improper input vali | |
| 5200 | CVE-2025-34273 |
|
44.4th | 6.5 | Nagios Log Server versions before 2024R2.0.3 have an authorization flaw that lets non-admin users de |
What is EPSS?
The Exploit Prediction Scoring System (EPSS) is a data-driven model developed by FIRST.org that estimates the probability a CVE will be exploited in the wild within the next 30 days. Unlike CVSS which measures severity, EPSS measures likelihood of exploitation — making it ideal for prioritizing which vulnerabilities to patch first.
Why EPSS matters: With thousands of CVEs published monthly, not all vulnerabilities are equally dangerous. EPSS helps security teams focus on the CVEs most likely to be actively exploited, rather than patching solely by CVSS score. A critical CVSS 9.8 vulnerability with 0.1% EPSS may be less urgent than a high CVSS 7.5 with 90% EPSS.
Prioritize by Exploit Risk
Scan your servers and see which vulnerabilities have the highest EPSS scores. Focus on what attackers are actually targeting.
Start Monitoring Free