Most Exploitable CVEs - EPSS Rankings
CVEs ranked by EPSS (Exploit Prediction Scoring System) probability. Higher scores mean a greater likelihood of exploitation in the wild within the next 30 days.
| Rank | CVE ID | EPSS Score | Percentile | CVSS | Flags | Summary |
|---|---|---|---|---|---|---|
| 5301 | CVE-2025-8638 |
|
18.9th | 6.8 | This vulnerability allows physically present attackers to execute arbitrary code with root privilege | |
| 5302 | CVE-2025-8637 |
|
18.9th | 6.8 | This vulnerability allows physically present attackers to execute arbitrary code with root privilege | |
| 5303 | CVE-2025-8636 |
|
18.9th | 6.8 | This vulnerability allows physically present attackers to execute arbitrary code with root privilege | |
| 5304 | CVE-2025-8635 |
|
18.9th | 6.8 | This vulnerability allows physically present attackers to execute arbitrary code with root privilege | |
| 5305 | CVE-2025-8634 |
|
18.9th | 6.8 | This vulnerability allows physically present attackers to execute arbitrary code with root privilege | |
| 5306 | CVE-2025-8633 |
|
18.9th | 6.8 | This vulnerability allows physically present attackers to execute arbitrary code with root privilege | |
| 5307 | CVE-2025-8632 |
|
18.9th | 6.8 | This vulnerability allows physically present attackers to execute arbitrary code with root privilege | |
| 5308 | CVE-2025-8631 |
|
18.9th | 6.8 | This vulnerability allows physically present attackers to execute arbitrary code with root privilege | |
| 5309 | CVE-2025-8630 |
|
18.9th | 6.8 | This vulnerability allows physically present attackers to execute arbitrary code with root privilege | |
| 5310 | CVE-2025-8629 |
|
18.9th | 6.8 | This vulnerability allows physically present attackers to execute arbitrary code with root privilege | |
| 5311 | CVE-2025-8628 |
|
18.9th | 6.8 | This vulnerability allows physically present attackers to execute arbitrary code with root privilege | |
| 5312 | CVE-2024-45183 |
|
18.8th | 6.5 | This vulnerability in Samsung Exynos mobile processors allows attackers to write data beyond allocat | |
| 5313 | CVE-2025-57877 |
|
19th | 4.8 | A reflected cross-site scripting (XSS) vulnerability in Esri Portal for ArcGIS allows remote authent | |
| 5314 | CVE-2025-57876 |
|
19th | 4.8 | A stored cross-site scripting vulnerability in Esri Portal for ArcGIS 11.4 and earlier allows authen | |
| 5315 | CVE-2025-57875 |
|
19th | 4.8 | A reflected cross-site scripting (XSS) vulnerability in Esri Portal for ArcGIS allows remote authent | |
| 5316 | CVE-2025-57874 |
|
19th | 4.8 | A reflected cross-site scripting (XSS) vulnerability in Esri Portal for ArcGIS versions 11.4 and bel | |
| 5317 | CVE-2025-57873 |
|
19th | 4.8 | A reflected cross-site scripting (XSS) vulnerability in Esri Portal for ArcGIS versions 11.4 and bel | |
| 5318 | CVE-2025-46150 |
|
19.1th | 5.3 | This CVE describes a vulnerability in PyTorch's torch.compile feature where FractionalMaxPool2d prod | |
| 5319 | CVE-2025-59433 |
|
18.8th | 5.3 | CVE-2025-59433 is an argument injection vulnerability in @conventional-changelog/git-client's getTag | |
| 5320 | CVE-2025-57203 |
|
18.8th | 4.8 | MagicProject AI version 9.1 has a stored XSS vulnerability in its chatbot generation feature that al | |
| 5321 | CVE-2025-59577 |
|
18.9th | 4.3 | A race condition vulnerability in MasterStudy LMS WordPress plugin allows attackers to exploit impro | |
| 5322 | CVE-2025-10305 |
|
18.9th | 5.3 | The Secure Passkeys WordPress plugin has an authorization vulnerability that allows authenticated us | |
| 5323 | CVE-2025-12249 |
|
19th | 6.3 | This CSV injection vulnerability in Axosoft Scrum and Bug Tracking allows attackers to inject malici | |
| 5324 | CVE-2025-10740 |
|
18.9th | 6.3 | This vulnerability allows authenticated WordPress users with Subscriber-level access or higher to mo | |
| 5325 | CVE-2025-61532 |
|
18.9th | 6.1 | This CVE describes a Cross-Site Scripting (XSS) vulnerability in SVX Portal versions 2.7A through 2. | |
| 5326 | CVE-2025-20361 |
|
19th | 4.8 | An authenticated cross-site scripting (XSS) vulnerability in Cisco Unified Communications Manager we | |
| 5327 | CVE-2025-54320 |
|
18.9th | 4.3 | Ascertia SigningHub versions through 8.6.8 have an email bombing vulnerability in the invite user fu | |
| 5328 | CVE-2025-13268 |
|
19th | 6.3 | This vulnerability allows remote attackers to execute injection attacks through the JDBC URL handler | |
| 5329 | CVE-2025-13266 |
|
18.9th | 5.3 | This CVE describes a path traversal vulnerability in wwwlike vlife software up to version 2.0.1. Att | |
| 5330 | CVE-2025-24847 |
|
19.1th | 4.5 | This vulnerability in Intel CIP software allows unprivileged software combined with a privileged use | |
| 5331 | CVE-2025-12677 |
|
19.1th | 5.3 | The KiotViet Sync WordPress plugin exposes webhook tokens to unauthenticated attackers through an AP | |
| 5332 | CVE-2025-35021 |
|
18.9th | 6.5 | This vulnerability allows attackers to bypass SSH authentication on unconfigured Abilis CPX devices | |
| 5333 | CVE-2025-12626 |
|
19th | 4.3 | This CVE describes a path traversal vulnerability in jeecgboot jeewx-boot that allows attackers to m | |
| 5334 | CVE-2025-14178 |
|
19.1th | 6.5 | A heap buffer overflow vulnerability in PHP's array_merge() function allows memory corruption when m | |
| 5335 | CVE-2025-34435 |
|
18.9th | 6.5 | AVideo versions before 20.1 contain an insecure direct object reference (IDOR) vulnerability that al | |
| 5336 | CVE-2025-14747 |
|
18.9th | 4.3 | This vulnerability allows an attacker on the local network to send a malformed RTSP Describe request | |
| 5337 | CVE-2025-14731 |
|
19th | 6.3 | This vulnerability in CTCMS Content Management System allows remote attackers to execute template in | |
| 5338 | CVE-2025-40831 |
|
19.1th | 6.5 | A vulnerability in SINEC Security Monitor allows authenticated low-privileged attackers to cause den | |
| 5339 | CVE-2025-14116 |
|
18.8th | 4.7 | This CVE describes a Server-Side Request Forgery (SSRF) vulnerability in xerrors Yuxi-Know software | |
| 5340 | CVE-2025-11379 |
|
19.1th | 5.3 | The WebP Express WordPress plugin exposes configuration data through predictable config file names o | |
| 5341 | CVE-2025-55181 |
|
19.1th | 5.3 | This vulnerability in Proxygen's HTTPQuicCoroSession allows an attacker to trigger an infinite loop | |
| 5342 | CVE-2025-13696 |
|
18.8th | 5.3 | The Zigaform WordPress plugin exposes sensitive form submission data through an unauthenticated AJAX | |
| 5343 | CVE-2026-1431 |
|
19.1th | 5.3 | The Booking Calendar plugin for WordPress has an authorization vulnerability that allows unauthentic | |
| 5344 | CVE-2025-15525 |
|
19.1th | 5.3 | The Ajax Load More WordPress plugin has an authorization vulnerability that allows unauthenticated a | |
| 5345 | CVE-2025-12825 |
|
19.1th | 5.3 | The User Registration Using Contact Form 7 WordPress plugin has an authorization bypass vulnerabilit | |
| 5346 | CVE-2025-27455 |
|
18.8th | 4.3 | This clickjacking vulnerability allows attackers to embed the web application in malicious frames, t | |
| 5347 | CVE-2025-49192 |
|
18.8th | 4.3 | This clickjacking vulnerability allows attackers to embed the vulnerable web application in an invis | |
| 5348 | CVE-2026-1004 |
|
18.9th | 5.3 | The Essential Addons for Elementor WordPress plugin exposes draft, pending, and private WooCommerce | |
| 5349 | CVE-2026-20969 |
|
18.9th | 5.5 | An improper input validation vulnerability in Samsung's SecSettings component allows local attackers | |
| 5350 | CVE-2026-21695 |
|
19th | 4.3 | This CVE describes a Mass Assignment vulnerability in Titra time tracking software that allows authe |
What is EPSS?
The Exploit Prediction Scoring System (EPSS) is a data-driven model developed by FIRST.org that estimates the probability a CVE will be exploited in the wild within the next 30 days. Unlike CVSS which measures severity, EPSS measures likelihood of exploitation — making it ideal for prioritizing which vulnerabilities to patch first.
Why EPSS matters: With thousands of CVEs published monthly, not all vulnerabilities are equally dangerous. EPSS helps security teams focus on the CVEs most likely to be actively exploited, rather than patching solely by CVSS score. A critical CVSS 9.8 vulnerability with 0.1% EPSS may be less urgent than a high CVSS 7.5 with 90% EPSS.
Prioritize by Exploit Risk
Scan your servers and see which vulnerabilities have the highest EPSS scores. Focus on what attackers are actually targeting.
Start Monitoring Free