Most Exploitable CVEs - EPSS Rankings
CVEs ranked by EPSS (Exploit Prediction Scoring System) probability. Higher scores mean a greater likelihood of exploitation in the wild within the next 30 days.
| Rank | CVE ID | EPSS Score | Percentile | CVSS | Flags | Summary |
|---|---|---|---|---|---|---|
| 5301 | CVE-2025-24043 |
|
43.8th | 7.5 | CVE-2025-24043 is a cryptographic signature verification vulnerability in .NET that allows authentic | |
| 5302 | CVE-2025-27516 |
|
43.7th | 8.8 | CVE-2025-27516 is a sandbox escape vulnerability in Jinja templating engine that allows attackers wh | |
| 5303 | CVE-2025-5288 |
|
43.8th | 9.8 | This vulnerability allows unauthenticated attackers to create new administrator accounts on WordPres | |
| 5304 | CVE-2025-42977 |
|
43.7th | 7.6 | SAP NetWeaver Visual Composer has a directory traversal vulnerability where high-privileged users ca | |
| 5305 | CVE-2025-7566 |
|
43.7th | 4.7 | This critical vulnerability in jshERP allows remote attackers to perform path traversal attacks via | |
| 5306 | CVE-2025-8804 |
|
43.8th | 5.3 | This vulnerability in Open5GS AMF component allows remote attackers to trigger a reachable assertion | |
| 5307 | CVE-2025-50870 |
|
43.8th | 9.8 | Institute-of-Current-Students 1.0 has an access control vulnerability in the mydetailsstudent.php en | |
| 5308 | CVE-2025-10452 |
|
43.8th | 9.8 | CVE-2025-10452 is a critical Missing Authentication vulnerability in Gotac's Statistical Database Sy | |
| 5309 | CVE-2025-54539 |
|
43.8th | 9.8 | A deserialization vulnerability in Apache ActiveMQ NMS AMQP Client allows malicious AMQP servers to | |
| 5310 | CVE-2025-42919 |
|
43.7th | 5.3 | CVE-2025-42919 is an information disclosure vulnerability in SAP NetWeaver Application Server Java t | |
| 5311 | CVE-2025-54322 |
|
43.8th | 10.0 | CVE-2025-54322 is an unauthenticated remote code execution vulnerability in Xspeeder SXZOS that allo | |
| 5312 | CVE-2025-67636 |
|
43.8th | 4.3 | This vulnerability in Jenkins allows attackers with View/Read permission to view encrypted password | |
| 5313 | CVE-2025-13510 |
|
43.7th | N/A | The Iskra iHUB and iHUB Lite smart metering gateways expose their web management interfaces without | |
| 5314 | CVE-2025-55125 |
|
43.8th | 7.8 | This vulnerability allows authenticated Backup or Tape Operators to execute arbitrary code with root | |
| 5315 | CVE-2025-23495 |
|
43.7th | 7.1 | This vulnerability allows attackers to inject malicious scripts into web pages viewed by other users | |
| 5316 | CVE-2024-53553 |
|
43.7th | 9.1 | This vulnerability allows attackers to bypass authentication in OPEXUS FOIAXPRESS PUBLIC ACCESS LINK | |
| 5317 | CVE-2025-23826 |
|
43.7th | 7.1 | This stored cross-site scripting (XSS) vulnerability in the WordPress Stop Comment Spam plugin allow | |
| 5318 | CVE-2024-13264 |
|
43.7th | 9.8 | This vulnerability in Drupal's Opigno module allows attackers to inject malicious PHP code through s | |
| 5319 | CVE-2024-57079 |
|
43.6th | 7.5 | This vulnerability is a prototype pollution flaw in the lib.deepMerge function of @zag-js/core v0.50 | |
| 5320 | CVE-2024-57074 |
|
43.6th | 7.5 | This CVE describes a prototype pollution vulnerability in the lib.merge function of xe-utils v3.5.31 | |
| 5321 | CVE-2025-24803 |
|
43.7th | 5.4 | CVE-2025-24803 is a stored cross-site scripting (XSS) vulnerability in Mobile Security Framework (Mo | |
| 5322 | CVE-2025-31099 |
|
43.6th | 7.6 | This SQL injection vulnerability in the Slider by BestWebSoft WordPress plugin allows attackers to e | |
| 5323 | CVE-2025-30921 |
|
43.6th | 7.6 | This SQL injection vulnerability in Tribulant Software Newsletters WordPress plugin allows attackers | |
| 5324 | CVE-2025-30879 |
|
43.6th | 7.6 | This SQL injection vulnerability in the MC Woocommerce Wishlist WordPress plugin allows attackers to | |
| 5325 | CVE-2025-30843 |
|
43.6th | 7.6 | This SQL injection vulnerability in the setriosoft bizcalendar-web WordPress plugin allows attackers | |
| 5326 | CVE-2025-30791 |
|
43.6th | 7.6 | This SQL injection vulnerability in the Cart tracking for WooCommerce WordPress plugin allows attack | |
| 5327 | CVE-2025-30525 |
|
43.6th | 7.6 | This SQL injection vulnerability in the WP Profitshare WordPress plugin allows attackers to execute | |
| 5328 | CVE-2025-30523 |
|
43.6th | 7.6 | This SQL injection vulnerability in the WordPress Super Simple Subscriptions plugin allows attackers | |
| 5329 | CVE-2025-30472 |
|
43.7th | 9.0 | Corosync versions through 3.1.9 contain a stack-based buffer overflow vulnerability in the orf_token | |
| 5330 | CVE-2024-11171 |
|
43.6th | 7.5 | This vulnerability allows unauthenticated attackers to crash LibreChat servers by uploading large fi | |
| 5331 | CVE-2025-25685 |
|
43.6th | 7.5 | This vulnerability allows attackers to download arbitrary files from GL-INet Beryl AX GL-MT3000 rout | |
| 5332 | CVE-2025-25614 |
|
43.7th | 8.8 | CVE-2025-25614 is an incorrect access control vulnerability in Unifiedtransform 2.0 that allows teac | |
| 5333 | CVE-2025-27412 |
|
43.6th | 6.1 | CVE-2025-27412 is a reflected cross-site scripting (XSS) vulnerability in REDAXO CMS that allows att | |
| 5334 | CVE-2025-27421 |
|
43.6th | 7.5 | A critical goroutine leak vulnerability in Abacus server's Server-Sent Events implementation allows | |
| 5335 | CVE-2025-3453 |
|
43.6th | 5.3 | This vulnerability in the Password Protected WordPress plugin allows unauthenticated attackers to ex | |
| 5336 | CVE-2025-39566 |
|
43.6th | 7.6 | This SQL injection vulnerability in the Bob Hostel WordPress plugin allows attackers to execute arbi | |
| 5337 | CVE-2025-39518 |
|
43.6th | 7.6 | This SQL injection vulnerability in RedefiningTheWeb BMA Lite WordPress plugin allows attackers to e | |
| 5338 | CVE-2025-26908 |
|
43.6th | 7.6 | This SQL injection vulnerability in the Gurmehub Kargo Entegratör WordPress plugin allows attackers | |
| 5339 | CVE-2025-32754 |
|
43.6th | 9.1 | This vulnerability allows network-based attackers to impersonate Jenkins SSH build agents by exploit | |
| 5340 | CVE-2025-32128 |
|
43.6th | 7.6 | This SQL injection vulnerability in the WordPress Nearby Locations plugin allows attackers to execut | |
| 5341 | CVE-2025-32685 |
|
43.6th | 7.6 | This SQL injection vulnerability in the WP Inquiries WordPress plugin allows attackers to execute ar | |
| 5342 | CVE-2025-32676 |
|
43.6th | 7.6 | This SQL injection vulnerability in Verowa Connect WordPress plugin allows attackers to execute arbi | |
| 5343 | CVE-2025-31476 |
|
43.6th | 4.8 | A cross-site scripting (XSS) vulnerability in tarteaucitron.js allows privileged users to inject mal | |
| 5344 | CVE-2025-32126 |
|
43.6th | 7.6 | This SQL injection vulnerability in the Pay with Contact Form 7 WordPress plugin allows attackers to | |
| 5345 | CVE-2025-32124 |
|
43.6th | 7.6 | This SQL injection vulnerability in the Behance Portfolio Manager WordPress plugin allows attackers | |
| 5346 | CVE-2025-32121 |
|
43.6th | 7.6 | This SQL injection vulnerability in the Video & Photo Gallery for Ultimate Member WordPress plugin a | |
| 5347 | CVE-2025-2786 |
|
43.7th | 4.3 | This vulnerability in Tempo Operator allows users with full namespace access to extract ServiceAccou | |
| 5348 | CVE-2025-3483 |
|
43.6th | 7.8 | This vulnerability allows remote attackers to execute arbitrary code on MedDream PACS Server install | |
| 5349 | CVE-2025-3481 |
|
43.6th | 7.8 | This vulnerability allows remote attackers to execute arbitrary code on MedDream PACS Server install | |
| 5350 | CVE-2025-49223 |
|
43.6th | 9.8 | CVE-2025-49223 is a prototype pollution vulnerability in billboard.js that allows attackers to injec |
What is EPSS?
The Exploit Prediction Scoring System (EPSS) is a data-driven model developed by FIRST.org that estimates the probability a CVE will be exploited in the wild within the next 30 days. Unlike CVSS which measures severity, EPSS measures likelihood of exploitation — making it ideal for prioritizing which vulnerabilities to patch first.
Why EPSS matters: With thousands of CVEs published monthly, not all vulnerabilities are equally dangerous. EPSS helps security teams focus on the CVEs most likely to be actively exploited, rather than patching solely by CVSS score. A critical CVSS 9.8 vulnerability with 0.1% EPSS may be less urgent than a high CVSS 7.5 with 90% EPSS.
Prioritize by Exploit Risk
Scan your servers and see which vulnerabilities have the highest EPSS scores. Focus on what attackers are actually targeting.
Start Monitoring Free