Most Exploitable CVEs - EPSS Rankings

CVEs ranked by EPSS (Exploit Prediction Scoring System) probability. Higher scores mean a greater likelihood of exploitation in the wild within the next 30 days.

164
EPSS > 50%
156
CISA KEV Listed
35,468
CVEs with EPSS
0.7%
Avg EPSS Score
All Critical High Medium Low
Rank CVE ID EPSS Score Percentile CVSS Flags Summary
5201 CVE-2025-60957
0.22%
44.4th 9.9 This OS command injection vulnerability in EndRun Technologies Sonoma D12 Network Time Server allows
5202 CVE-2025-13445
0.22%
44.4th 8.8 CVE-2025-13445 is a stack-based buffer overflow vulnerability in Tenda AC21 routers that allows remo
5203 CVE-2025-63207
0.22%
44.4th 9.8 This vulnerability allows unauthenticated attackers to change all user passwords (Admin, Operator, U
5204 CVE-2025-23862
0.22%
44.2th 5.3 This vulnerability allows attackers to bypass authorization controls in the Contact Form 7 Anti Spam
5205 CVE-2025-0438
0.22%
44.3th 8.8 A stack buffer overflow vulnerability in Google Chrome's Tracing component allows remote attackers t
5206 CVE-2025-21393
0.22%
44.3th 6.3 This CVE describes a cross-site scripting (XSS) vulnerability in Microsoft SharePoint Server that al
5207 CVE-2023-32240
0.22%
44.2th 5.4 This CVE describes a missing authorization vulnerability in the Xtemos WoodMart WordPress theme that
5208 CVE-2025-2110
0.22%
44.3th 8.8 The WP Compress WordPress plugin has missing capability checks on AJAX functions, allowing authentic
5209 CVE-2024-58113
0.22%
44.3th 5.3 This vulnerability involves improper resource management in memory management modules, potentially c
5210 CVE-2025-0278
0.22%
44.3th 4.3 HCL Traveler for Windows exposes internal file paths in error messages or debug logs, potentially re
5211 CVE-2025-5831
0.22%
44.3th 8.8 The Droip WordPress plugin allows authenticated attackers with Subscriber-level access or higher to
5212 CVE-2025-54141
0.22%
44.3th 7.5 This CVE describes a directory traversal vulnerability in ViewVC's standalone.py script that allows
5213 CVE-2025-9748
0.22%
44.3th 8.8 A stack-based buffer overflow vulnerability exists in Tenda CH22 router firmware version 1.0.0.1. Re
5214 CVE-2025-53760
0.22%
44.3th 7.1 This Server-Side Request Forgery (SSRF) vulnerability in Microsoft Office SharePoint allows authenti
5215 CVE-2025-56676
0.22%
44.3th 5.4 TitanSystems Zender v3.9.7 has a critical authentication bypass vulnerability where password reset t
5216 CVE-2025-27088
0.22%
44.2th 8.2 A reflected cross-site scripting (XSS) vulnerability in oxyno-zeta/s3-proxy allows attackers to craf
5217 CVE-2025-26410
0.22%
44.2th 9.8 All Wattsense Bridge devices contain hard-coded credentials in their firmware, allowing attackers to
5218 CVE-2025-31584
0.22%
44.2th 5.4 This CVE describes a Missing Authorization vulnerability in the Elfsight Testimonials Slider WordPre
5219 CVE-2025-31545
0.22%
44.2th 5.4 This CVE describes a Missing Authorization vulnerability in the WP Messiah Safe Ai Malware Protectio
5220 CVE-2025-30896
0.22%
44.2th 5.4 This CVE describes a Missing Authorization vulnerability in weDevs WP ERP WordPress plugin that allo
5221 CVE-2025-30809
0.22%
44.2th 5.4 A missing authorization vulnerability in the Shahjada Live Forms WordPress plugin allows attackers t
5222 CVE-2025-32620
0.22%
44.2th 7.1 This CVE describes a Missing Authorization vulnerability in the Doppler Forms WordPress plugin that
5223 CVE-2025-24737
0.22%
44.2th 6.5 This CVE describes a missing authorization vulnerability in WP Helper Premium plugin that allows att
5224 CVE-2025-39591
0.22%
44.2th 5.4 This CVE describes a missing authorization vulnerability in WP Shuffle WP Subscription Forms WordPre
5225 CVE-2025-39522
0.22%
44.2th 5.4 This CVE describes a Missing Authorization vulnerability in the WordPress Dynamic Post plugin that a
5226 CVE-2025-32216
0.22%
44.2th 6.4 A missing authorization vulnerability in Spider Elements – Addons for Elementor WordPress plugin a
5227 CVE-2025-32246
0.22%
44.2th 5.4 This CVE describes a missing authorization vulnerability in the Tim Nguyen 1-Click Backup & Restore
5228 CVE-2025-31794
0.22%
44.2th 5.4 This CVE describes a Missing Authorization vulnerability in the WR Price List Manager For Woocommerc
5229 CVE-2025-31746
0.22%
44.2th 6.4 This CVE describes a missing authorization vulnerability in the Think201 Clients WordPress plugin th
5230 CVE-2025-31878
0.22%
44.2th 5.4 This CVE describes a Missing Authorization vulnerability in the UPC/EAN/GTIN Code Generator WordPres
5231 CVE-2025-31867
0.22%
44.2th 5.4 This vulnerability allows attackers to bypass authorization controls in JoomSky JS Job Manager by ma
5232 CVE-2025-31854
0.22%
44.2th 4.3 This CVE describes a missing authorization vulnerability in the Simple Sticky Add To Cart For WooCom
5233 CVE-2025-31826
0.22%
44.2th 5.4 This CVE describes a Missing Authorization vulnerability in the Ni WooCommerce Cost Of Goods plugin
5234 CVE-2025-31816
0.22%
44.2th 5.4 This CVE describes a missing authorization vulnerability in the Mobile App Canvas WordPress plugin t
5235 CVE-2025-31802
0.22%
44.2th 5.4 A missing authorization vulnerability in Shiptimize for WooCommerce allows attackers to change plugi
5236 CVE-2025-31791
0.22%
44.2th 5.4 This CVE describes a missing authorization vulnerability in the Pin Generator WordPress plugin that
5237 CVE-2025-31782
0.22%
44.2th 5.4 This CVE describes a missing authorization vulnerability in the mb.YTPlayer WordPress plugin that al
5238 CVE-2026-1615
0.22%
44.2th 9.8 The jsonpath package is vulnerable to arbitrary code execution via malicious JSON Path expressions.
5239 CVE-2025-66646
0.22%
44.2th 7.5 A NULL pointer dereference vulnerability in RIOT OS's IPv6 fragmentation reassembly allows remote at
5240 CVE-2025-43494
0.22%
44.2th 7.5 A mail header parsing vulnerability in Apple operating systems allows attackers to cause persistent
5241 CVE-2026-2085
0.22%
44.2th 7.2 This CVE describes a command injection vulnerability in D-Link DWR-M921 routers via the USSD configu
5242 CVE-2021-47891
0.22%
44.2th 9.8 CVE-2021-47891 is a critical remote code execution vulnerability in Unified Remote 3.9.0.2463 that a
5243 CVE-2024-7695
0.22%
44th 7.5 An out-of-bounds write vulnerability in multiple Moxa industrial switches allows attackers to write
5244 CVE-2025-1555
0.22%
44th 7.3 This critical vulnerability in hzmanyun Education and Training System 3.1.1 allows remote attackers
5245 CVE-2025-30460
0.22%
44th 7.4 A permissions vulnerability in macOS allows applications to bypass access controls and access protec
5246 CVE-2025-1315
0.22%
44th 9.8 The InWave Jobs WordPress plugin has a privilege escalation vulnerability that allows unauthenticate
5247 CVE-2025-21605
0.22%
44.1th 7.5 CVE-2025-21605 is a memory exhaustion vulnerability in Redis where unauthenticated clients can cause
5248 CVE-2025-3694
0.22%
44.1th 7.3 This critical SQL injection vulnerability in SourceCodester Web-based Pharmacy Product Management Sy
5249 CVE-2025-30009
0.22%
44.1th 6.1 This vulnerability in SAP SRM's Live Auction Cockpit allows unauthenticated attackers to execute mal
5250 CVE-2025-5985
0.22%
44th 7.3 CVE-2025-5985 is an improper authentication vulnerability in code-projects School Fees Payment Syste

What is EPSS?

The Exploit Prediction Scoring System (EPSS) is a data-driven model developed by FIRST.org that estimates the probability a CVE will be exploited in the wild within the next 30 days. Unlike CVSS which measures severity, EPSS measures likelihood of exploitation — making it ideal for prioritizing which vulnerabilities to patch first.

Why EPSS matters: With thousands of CVEs published monthly, not all vulnerabilities are equally dangerous. EPSS helps security teams focus on the CVEs most likely to be actively exploited, rather than patching solely by CVSS score. A critical CVSS 9.8 vulnerability with 0.1% EPSS may be less urgent than a high CVSS 7.5 with 90% EPSS.

Prioritize by Exploit Risk

Scan your servers and see which vulnerabilities have the highest EPSS scores. Focus on what attackers are actually targeting.

Start Monitoring Free