Most Exploitable CVEs - EPSS Rankings
CVEs ranked by EPSS (Exploit Prediction Scoring System) probability. Higher scores mean a greater likelihood of exploitation in the wild within the next 30 days.
| Rank | CVE ID | EPSS Score | Percentile | CVSS | Flags | Summary |
|---|---|---|---|---|---|---|
| 5201 | CVE-2025-60957 |
|
44.4th | 9.9 | This OS command injection vulnerability in EndRun Technologies Sonoma D12 Network Time Server allows | |
| 5202 | CVE-2025-13445 |
|
44.4th | 8.8 | CVE-2025-13445 is a stack-based buffer overflow vulnerability in Tenda AC21 routers that allows remo | |
| 5203 | CVE-2025-63207 |
|
44.4th | 9.8 | This vulnerability allows unauthenticated attackers to change all user passwords (Admin, Operator, U | |
| 5204 | CVE-2025-23862 |
|
44.2th | 5.3 | This vulnerability allows attackers to bypass authorization controls in the Contact Form 7 Anti Spam | |
| 5205 | CVE-2025-0438 |
|
44.3th | 8.8 | A stack buffer overflow vulnerability in Google Chrome's Tracing component allows remote attackers t | |
| 5206 | CVE-2025-21393 |
|
44.3th | 6.3 | This CVE describes a cross-site scripting (XSS) vulnerability in Microsoft SharePoint Server that al | |
| 5207 | CVE-2023-32240 |
|
44.2th | 5.4 | This CVE describes a missing authorization vulnerability in the Xtemos WoodMart WordPress theme that | |
| 5208 | CVE-2025-2110 |
|
44.3th | 8.8 | The WP Compress WordPress plugin has missing capability checks on AJAX functions, allowing authentic | |
| 5209 | CVE-2024-58113 |
|
44.3th | 5.3 | This vulnerability involves improper resource management in memory management modules, potentially c | |
| 5210 | CVE-2025-0278 |
|
44.3th | 4.3 | HCL Traveler for Windows exposes internal file paths in error messages or debug logs, potentially re | |
| 5211 | CVE-2025-5831 |
|
44.3th | 8.8 | The Droip WordPress plugin allows authenticated attackers with Subscriber-level access or higher to | |
| 5212 | CVE-2025-54141 |
|
44.3th | 7.5 | This CVE describes a directory traversal vulnerability in ViewVC's standalone.py script that allows | |
| 5213 | CVE-2025-9748 |
|
44.3th | 8.8 | A stack-based buffer overflow vulnerability exists in Tenda CH22 router firmware version 1.0.0.1. Re | |
| 5214 | CVE-2025-53760 |
|
44.3th | 7.1 | This Server-Side Request Forgery (SSRF) vulnerability in Microsoft Office SharePoint allows authenti | |
| 5215 | CVE-2025-56676 |
|
44.3th | 5.4 | TitanSystems Zender v3.9.7 has a critical authentication bypass vulnerability where password reset t | |
| 5216 | CVE-2025-27088 |
|
44.2th | 8.2 | A reflected cross-site scripting (XSS) vulnerability in oxyno-zeta/s3-proxy allows attackers to craf | |
| 5217 | CVE-2025-26410 |
|
44.2th | 9.8 | All Wattsense Bridge devices contain hard-coded credentials in their firmware, allowing attackers to | |
| 5218 | CVE-2025-31584 |
|
44.2th | 5.4 | This CVE describes a Missing Authorization vulnerability in the Elfsight Testimonials Slider WordPre | |
| 5219 | CVE-2025-31545 |
|
44.2th | 5.4 | This CVE describes a Missing Authorization vulnerability in the WP Messiah Safe Ai Malware Protectio | |
| 5220 | CVE-2025-30896 |
|
44.2th | 5.4 | This CVE describes a Missing Authorization vulnerability in weDevs WP ERP WordPress plugin that allo | |
| 5221 | CVE-2025-30809 |
|
44.2th | 5.4 | A missing authorization vulnerability in the Shahjada Live Forms WordPress plugin allows attackers t | |
| 5222 | CVE-2025-32620 |
|
44.2th | 7.1 | This CVE describes a Missing Authorization vulnerability in the Doppler Forms WordPress plugin that | |
| 5223 | CVE-2025-24737 |
|
44.2th | 6.5 | This CVE describes a missing authorization vulnerability in WP Helper Premium plugin that allows att | |
| 5224 | CVE-2025-39591 |
|
44.2th | 5.4 | This CVE describes a missing authorization vulnerability in WP Shuffle WP Subscription Forms WordPre | |
| 5225 | CVE-2025-39522 |
|
44.2th | 5.4 | This CVE describes a Missing Authorization vulnerability in the WordPress Dynamic Post plugin that a | |
| 5226 | CVE-2025-32216 |
|
44.2th | 6.4 | A missing authorization vulnerability in Spider Elements – Addons for Elementor WordPress plugin a | |
| 5227 | CVE-2025-32246 |
|
44.2th | 5.4 | This CVE describes a missing authorization vulnerability in the Tim Nguyen 1-Click Backup & Restore | |
| 5228 | CVE-2025-31794 |
|
44.2th | 5.4 | This CVE describes a Missing Authorization vulnerability in the WR Price List Manager For Woocommerc | |
| 5229 | CVE-2025-31746 |
|
44.2th | 6.4 | This CVE describes a missing authorization vulnerability in the Think201 Clients WordPress plugin th | |
| 5230 | CVE-2025-31878 |
|
44.2th | 5.4 | This CVE describes a Missing Authorization vulnerability in the UPC/EAN/GTIN Code Generator WordPres | |
| 5231 | CVE-2025-31867 |
|
44.2th | 5.4 | This vulnerability allows attackers to bypass authorization controls in JoomSky JS Job Manager by ma | |
| 5232 | CVE-2025-31854 |
|
44.2th | 4.3 | This CVE describes a missing authorization vulnerability in the Simple Sticky Add To Cart For WooCom | |
| 5233 | CVE-2025-31826 |
|
44.2th | 5.4 | This CVE describes a Missing Authorization vulnerability in the Ni WooCommerce Cost Of Goods plugin | |
| 5234 | CVE-2025-31816 |
|
44.2th | 5.4 | This CVE describes a missing authorization vulnerability in the Mobile App Canvas WordPress plugin t | |
| 5235 | CVE-2025-31802 |
|
44.2th | 5.4 | A missing authorization vulnerability in Shiptimize for WooCommerce allows attackers to change plugi | |
| 5236 | CVE-2025-31791 |
|
44.2th | 5.4 | This CVE describes a missing authorization vulnerability in the Pin Generator WordPress plugin that | |
| 5237 | CVE-2025-31782 |
|
44.2th | 5.4 | This CVE describes a missing authorization vulnerability in the mb.YTPlayer WordPress plugin that al | |
| 5238 | CVE-2026-1615 |
|
44.2th | 9.8 | The jsonpath package is vulnerable to arbitrary code execution via malicious JSON Path expressions. | |
| 5239 | CVE-2025-66646 |
|
44.2th | 7.5 | A NULL pointer dereference vulnerability in RIOT OS's IPv6 fragmentation reassembly allows remote at | |
| 5240 | CVE-2025-43494 |
|
44.2th | 7.5 | A mail header parsing vulnerability in Apple operating systems allows attackers to cause persistent | |
| 5241 | CVE-2026-2085 |
|
44.2th | 7.2 | This CVE describes a command injection vulnerability in D-Link DWR-M921 routers via the USSD configu | |
| 5242 | CVE-2021-47891 |
|
44.2th | 9.8 | CVE-2021-47891 is a critical remote code execution vulnerability in Unified Remote 3.9.0.2463 that a | |
| 5243 | CVE-2024-7695 |
|
44th | 7.5 | An out-of-bounds write vulnerability in multiple Moxa industrial switches allows attackers to write | |
| 5244 | CVE-2025-1555 |
|
44th | 7.3 | This critical vulnerability in hzmanyun Education and Training System 3.1.1 allows remote attackers | |
| 5245 | CVE-2025-30460 |
|
44th | 7.4 | A permissions vulnerability in macOS allows applications to bypass access controls and access protec | |
| 5246 | CVE-2025-1315 |
|
44th | 9.8 | The InWave Jobs WordPress plugin has a privilege escalation vulnerability that allows unauthenticate | |
| 5247 | CVE-2025-21605 |
|
44.1th | 7.5 | CVE-2025-21605 is a memory exhaustion vulnerability in Redis where unauthenticated clients can cause | |
| 5248 | CVE-2025-3694 |
|
44.1th | 7.3 | This critical SQL injection vulnerability in SourceCodester Web-based Pharmacy Product Management Sy | |
| 5249 | CVE-2025-30009 |
|
44.1th | 6.1 | This vulnerability in SAP SRM's Live Auction Cockpit allows unauthenticated attackers to execute mal | |
| 5250 | CVE-2025-5985 |
|
44th | 7.3 | CVE-2025-5985 is an improper authentication vulnerability in code-projects School Fees Payment Syste |
What is EPSS?
The Exploit Prediction Scoring System (EPSS) is a data-driven model developed by FIRST.org that estimates the probability a CVE will be exploited in the wild within the next 30 days. Unlike CVSS which measures severity, EPSS measures likelihood of exploitation — making it ideal for prioritizing which vulnerabilities to patch first.
Why EPSS matters: With thousands of CVEs published monthly, not all vulnerabilities are equally dangerous. EPSS helps security teams focus on the CVEs most likely to be actively exploited, rather than patching solely by CVSS score. A critical CVSS 9.8 vulnerability with 0.1% EPSS may be less urgent than a high CVSS 7.5 with 90% EPSS.
Prioritize by Exploit Risk
Scan your servers and see which vulnerabilities have the highest EPSS scores. Focus on what attackers are actually targeting.
Start Monitoring Free