Most Exploitable CVEs - EPSS Rankings

CVEs ranked by EPSS (Exploit Prediction Scoring System) probability. Higher scores mean a greater likelihood of exploitation in the wild within the next 30 days.

164
EPSS > 50%
156
CISA KEV Listed
35,468
CVEs with EPSS
0.7%
Avg EPSS Score
All Critical High Medium Low
Rank CVE ID EPSS Score Percentile CVSS Flags Summary
5301 CVE-2025-24043
0.21%
43.8th 7.5 CVE-2025-24043 is a cryptographic signature verification vulnerability in .NET that allows authentic
5302 CVE-2025-27516
0.21%
43.7th 8.8 CVE-2025-27516 is a sandbox escape vulnerability in Jinja templating engine that allows attackers wh
5303 CVE-2025-5288
0.21%
43.8th 9.8 This vulnerability allows unauthenticated attackers to create new administrator accounts on WordPres
5304 CVE-2025-42977
0.21%
43.7th 7.6 SAP NetWeaver Visual Composer has a directory traversal vulnerability where high-privileged users ca
5305 CVE-2025-7566
0.21%
43.7th 4.7 This critical vulnerability in jshERP allows remote attackers to perform path traversal attacks via
5306 CVE-2025-8804
0.21%
43.8th 5.3 This vulnerability in Open5GS AMF component allows remote attackers to trigger a reachable assertion
5307 CVE-2025-50870
0.21%
43.8th 9.8 Institute-of-Current-Students 1.0 has an access control vulnerability in the mydetailsstudent.php en
5308 CVE-2025-10452
0.21%
43.8th 9.8 CVE-2025-10452 is a critical Missing Authentication vulnerability in Gotac's Statistical Database Sy
5309 CVE-2025-54539
0.21%
43.8th 9.8 A deserialization vulnerability in Apache ActiveMQ NMS AMQP Client allows malicious AMQP servers to
5310 CVE-2025-42919
0.21%
43.7th 5.3 CVE-2025-42919 is an information disclosure vulnerability in SAP NetWeaver Application Server Java t
5311 CVE-2025-54322
0.21%
43.8th 10.0 CVE-2025-54322 is an unauthenticated remote code execution vulnerability in Xspeeder SXZOS that allo
5312 CVE-2025-67636
0.21%
43.8th 4.3 This vulnerability in Jenkins allows attackers with View/Read permission to view encrypted password
5313 CVE-2025-13510
0.21%
43.7th N/A The Iskra iHUB and iHUB Lite smart metering gateways expose their web management interfaces without
5314 CVE-2025-55125
0.21%
43.8th 7.8 This vulnerability allows authenticated Backup or Tape Operators to execute arbitrary code with root
5315 CVE-2025-23495
0.21%
43.7th 7.1 This vulnerability allows attackers to inject malicious scripts into web pages viewed by other users
5316 CVE-2024-53553
0.21%
43.7th 9.1 This vulnerability allows attackers to bypass authentication in OPEXUS FOIAXPRESS PUBLIC ACCESS LINK
5317 CVE-2025-23826
0.21%
43.7th 7.1 This stored cross-site scripting (XSS) vulnerability in the WordPress Stop Comment Spam plugin allow
5318 CVE-2024-13264
0.21%
43.7th 9.8 This vulnerability in Drupal's Opigno module allows attackers to inject malicious PHP code through s
5319 CVE-2024-57079
0.21%
43.6th 7.5 This vulnerability is a prototype pollution flaw in the lib.deepMerge function of @zag-js/core v0.50
5320 CVE-2024-57074
0.21%
43.6th 7.5 This CVE describes a prototype pollution vulnerability in the lib.merge function of xe-utils v3.5.31
5321 CVE-2025-24803
0.21%
43.7th 5.4 CVE-2025-24803 is a stored cross-site scripting (XSS) vulnerability in Mobile Security Framework (Mo
5322 CVE-2025-31099
0.21%
43.6th 7.6 This SQL injection vulnerability in the Slider by BestWebSoft WordPress plugin allows attackers to e
5323 CVE-2025-30921
0.21%
43.6th 7.6 This SQL injection vulnerability in Tribulant Software Newsletters WordPress plugin allows attackers
5324 CVE-2025-30879
0.21%
43.6th 7.6 This SQL injection vulnerability in the MC Woocommerce Wishlist WordPress plugin allows attackers to
5325 CVE-2025-30843
0.21%
43.6th 7.6 This SQL injection vulnerability in the setriosoft bizcalendar-web WordPress plugin allows attackers
5326 CVE-2025-30791
0.21%
43.6th 7.6 This SQL injection vulnerability in the Cart tracking for WooCommerce WordPress plugin allows attack
5327 CVE-2025-30525
0.21%
43.6th 7.6 This SQL injection vulnerability in the WP Profitshare WordPress plugin allows attackers to execute
5328 CVE-2025-30523
0.21%
43.6th 7.6 This SQL injection vulnerability in the WordPress Super Simple Subscriptions plugin allows attackers
5329 CVE-2025-30472
0.21%
43.7th 9.0 Corosync versions through 3.1.9 contain a stack-based buffer overflow vulnerability in the orf_token
5330 CVE-2024-11171
0.21%
43.6th 7.5 This vulnerability allows unauthenticated attackers to crash LibreChat servers by uploading large fi
5331 CVE-2025-25685
0.21%
43.6th 7.5 This vulnerability allows attackers to download arbitrary files from GL-INet Beryl AX GL-MT3000 rout
5332 CVE-2025-25614
0.21%
43.7th 8.8 CVE-2025-25614 is an incorrect access control vulnerability in Unifiedtransform 2.0 that allows teac
5333 CVE-2025-27412
0.21%
43.6th 6.1 CVE-2025-27412 is a reflected cross-site scripting (XSS) vulnerability in REDAXO CMS that allows att
5334 CVE-2025-27421
0.21%
43.6th 7.5 A critical goroutine leak vulnerability in Abacus server's Server-Sent Events implementation allows
5335 CVE-2025-3453
0.21%
43.6th 5.3 This vulnerability in the Password Protected WordPress plugin allows unauthenticated attackers to ex
5336 CVE-2025-39566
0.21%
43.6th 7.6 This SQL injection vulnerability in the Bob Hostel WordPress plugin allows attackers to execute arbi
5337 CVE-2025-39518
0.21%
43.6th 7.6 This SQL injection vulnerability in RedefiningTheWeb BMA Lite WordPress plugin allows attackers to e
5338 CVE-2025-26908
0.21%
43.6th 7.6 This SQL injection vulnerability in the Gurmehub Kargo Entegratör WordPress plugin allows attackers
5339 CVE-2025-32754
0.21%
43.6th 9.1 This vulnerability allows network-based attackers to impersonate Jenkins SSH build agents by exploit
5340 CVE-2025-32128
0.21%
43.6th 7.6 This SQL injection vulnerability in the WordPress Nearby Locations plugin allows attackers to execut
5341 CVE-2025-32685
0.21%
43.6th 7.6 This SQL injection vulnerability in the WP Inquiries WordPress plugin allows attackers to execute ar
5342 CVE-2025-32676
0.21%
43.6th 7.6 This SQL injection vulnerability in Verowa Connect WordPress plugin allows attackers to execute arbi
5343 CVE-2025-31476
0.21%
43.6th 4.8 A cross-site scripting (XSS) vulnerability in tarteaucitron.js allows privileged users to inject mal
5344 CVE-2025-32126
0.21%
43.6th 7.6 This SQL injection vulnerability in the Pay with Contact Form 7 WordPress plugin allows attackers to
5345 CVE-2025-32124
0.21%
43.6th 7.6 This SQL injection vulnerability in the Behance Portfolio Manager WordPress plugin allows attackers
5346 CVE-2025-32121
0.21%
43.6th 7.6 This SQL injection vulnerability in the Video & Photo Gallery for Ultimate Member WordPress plugin a
5347 CVE-2025-2786
0.21%
43.7th 4.3 This vulnerability in Tempo Operator allows users with full namespace access to extract ServiceAccou
5348 CVE-2025-3483
0.21%
43.6th 7.8 This vulnerability allows remote attackers to execute arbitrary code on MedDream PACS Server install
5349 CVE-2025-3481
0.21%
43.6th 7.8 This vulnerability allows remote attackers to execute arbitrary code on MedDream PACS Server install
5350 CVE-2025-49223
0.21%
43.6th 9.8 CVE-2025-49223 is a prototype pollution vulnerability in billboard.js that allows attackers to injec

What is EPSS?

The Exploit Prediction Scoring System (EPSS) is a data-driven model developed by FIRST.org that estimates the probability a CVE will be exploited in the wild within the next 30 days. Unlike CVSS which measures severity, EPSS measures likelihood of exploitation — making it ideal for prioritizing which vulnerabilities to patch first.

Why EPSS matters: With thousands of CVEs published monthly, not all vulnerabilities are equally dangerous. EPSS helps security teams focus on the CVEs most likely to be actively exploited, rather than patching solely by CVSS score. A critical CVSS 9.8 vulnerability with 0.1% EPSS may be less urgent than a high CVSS 7.5 with 90% EPSS.

Prioritize by Exploit Risk

Scan your servers and see which vulnerabilities have the highest EPSS scores. Focus on what attackers are actually targeting.

Start Monitoring Free