Most Exploitable CVEs - EPSS Rankings

CVEs ranked by EPSS (Exploit Prediction Scoring System) probability. Higher scores mean a greater likelihood of exploitation in the wild within the next 30 days.

164
EPSS > 50%
156
CISA KEV Listed
35,468
CVEs with EPSS
0.7%
Avg EPSS Score
All Critical High Medium Low
Rank CVE ID EPSS Score Percentile CVSS Flags Summary
501 CVE-2024-9701
1.19%
78.5th 9.8 This CVE describes a critical Remote Code Execution vulnerability in Kedro's ShelveStore class (vers
502 CVE-2024-39782
1.18%
78.4th 9.1 This CVE describes multiple OS command injection vulnerabilities in the Wavlink AC3000 router's web
503 CVE-2024-9636
1.17%
78.3th 9.8 The Post Grid and Gutenberg Blocks WordPress plugin allows unauthenticated attackers to register as
504 CVE-2025-57285
1.17%
78.3th 9.8 CVE-2025-57285 is a critical command injection vulnerability in codeceptjs 3.7.3 that allows attacke
505 CVE-2024-11958
1.17%
78.3th 9.8 A critical SQL injection vulnerability in the duckdb_retriever component of run-llama/llama_index al
506 CVE-2021-47728
1.16%
78.3th 9.8 This vulnerability allows remote attackers to execute arbitrary shell commands on Selea Targa IP OCR
507 CVE-2024-24292
1.16%
78.3th 9.8 This CVE describes a Prototype Pollution vulnerability in Aliconnect /sdk version 0.0.6 that allows
508 CVE-2024-49375
1.16%
78.2th 9.0 CVE-2024-49375 is a critical remote code execution vulnerability in Rasa, an open-source machine lea
509 CVE-2025-1044
1.16%
78.2th 9.8 This critical authentication bypass vulnerability allows remote attackers to completely bypass authe
510 CVE-2012-10063
1.16%
78.2th 9.8 This SQL injection vulnerability in Nagios XI's legacy Core Configuration Manager allows authenticat
511 CVE-2025-7441
1.16%
78.2th 9.8 The StoryChief WordPress plugin has an unauthenticated arbitrary file upload vulnerability in its RE
512 CVE-2024-8958
1.15%
78.1th 9.8 This vulnerability allows attackers to read and write arbitrary files on servers running composiohq/
513 CVE-2025-59834
1.15%
78.1th 9.8 CVE-2025-59834 is a command injection vulnerability in ADB MCP Server versions 0.1.0 and earlier tha
514 CVE-2025-6439
1.14%
78.1th 9.8 This vulnerability allows unauthenticated attackers to delete arbitrary files on WordPress servers r
515 CVE-2025-7526
1.14%
78.1th 9.8 This vulnerability allows unauthenticated attackers to delete arbitrary files on WordPress servers r
516 CVE-2025-1771
1.14%
78th 9.8 This vulnerability in the Traveler WordPress theme allows unauthenticated attackers to include and e
517 CVE-2025-29386
1.13%
78th 9.8 This vulnerability allows remote attackers to execute arbitrary code on Tenda AC9 routers by exploit
518 CVE-2022-2421
1.13%
78th 10.0 CVE-2022-2421 is a critical vulnerability in the Socket.io JavaScript library that allows attackers
519 CVE-2025-32434
1.13%
77.9th 9.8 A critical Remote Command Execution vulnerability exists in PyTorch when loading models with torch.l
520 CVE-2025-7696
1.12%
77.9th 9.8 This vulnerability allows unauthenticated attackers to perform PHP object injection through the Inte
521 CVE-2025-50756
1.12%
77.9th 9.8 This CVE describes a command injection vulnerability in Wavlink WN535K3 routers that allows attacker
522 CVE-2025-22953
1.12%
77.9th 9.8 This is an unauthenticated SQL injection vulnerability in Epicor HCM's JsonFetcher.svc endpoint that
523 CVE-2025-0357
1.12%
77.8th 9.8 The WPBookit WordPress plugin allows unauthenticated attackers to upload arbitrary files due to insu
524 CVE-2025-29813
1.12%
77.8th 10.0 CVE-2025-29813 is an authentication bypass vulnerability in Azure DevOps that allows attackers to sp
525 CVE-2021-35942
1.11%
77.8th 9.1 This vulnerability in glibc's wordexp function allows attackers to cause denial of service or potent
526 CVE-2025-55583
1.11%
77.7th 9.8 This critical vulnerability allows unauthenticated remote attackers to execute arbitrary operating s
527 CVE-2025-48471
1.1%
77.7th 9.8 FreeScout versions before 1.8.179 have an unrestricted file upload vulnerability that allows attacke
528 CVE-2021-47667
1.1%
77.7th 10.0 This CVE describes an unauthenticated remote OS command injection vulnerability in ZendTo file trans
529 CVE-2025-6810
1.1%
77.6th 9.8 This vulnerability in Mescius ActiveReports.NET allows remote attackers to execute arbitrary code by
530 CVE-2025-34186
1.09%
77.6th 9.8 This vulnerability allows remote attackers to bypass authentication on Ilevia EVE X1/X5 Server by in
531 CVE-2025-0455
1.09%
77.6th 9.8 CVE-2025-0455 is a critical SQL injection vulnerability in NetVision Information's airPASS product t
532 CVE-2024-37385
1.09%
77.5th 9.8 This vulnerability allows remote command injection in Roundcube Webmail on Windows systems through t
533 CVE-2025-15061
1.08%
77.5th 9.8 This vulnerability allows remote attackers to execute arbitrary code on Framelink Figma MCP Server i
534 CVE-2025-0105
1.08%
77.5th 9.1 CVE-2025-0105 is an arbitrary file deletion vulnerability in Palo Alto Networks Expedition that allo
535 CVE-2024-10838
1.08%
77.5th 9.1 CVE-2024-10838 is an integer underflow vulnerability in Eclipse Cyclone DDS during deserialization t
536 CVE-2025-32363
1.06%
77.3th 9.8 CVE-2025-32363 is a critical remote code execution vulnerability in mediDOK software versions before
537 CVE-2025-3363
1.06%
77.3th 9.8 CVE-2025-3363 is a critical OS command injection vulnerability in HGiga's iSherlock web service that
538 CVE-2025-3361
1.06%
77.3th 9.8 CVE-2025-3361 is an unauthenticated OS command injection vulnerability in HGiga iSherlock web servic
539 CVE-2025-22946
1.06%
77.2th 9.8 This CVE describes a stack overflow vulnerability in Tenda AC9 v1.0 routers that allows remote attac
540 CVE-2015-2079
1.05%
77.2th 9.9 This vulnerability allows remote attackers to execute arbitrary code on Usermin servers by exploitin
541 CVE-2022-33186
1.05%
77.2th 9.8 This critical vulnerability in Brocade Fabric OS allows remote unauthenticated attackers to execute
542 CVE-2024-11617
1.05%
77.2th 9.8 The Envolve Plugin for WordPress allows unauthenticated attackers to upload arbitrary files due to m
543 CVE-2025-40553
1.05%
77.2th 9.8 SolarWinds Web Help Desk has an unauthenticated remote code execution vulnerability via untrusted da
544 CVE-2018-25120
1.05%
77.1th 9.8 This CVE describes a critical command injection vulnerability in D-Link DNS-343 ShareCenter network
545 CVE-2025-57644
1.05%
77.1th 9.1 Accela Automation Platform 22.2.3.0.230103 contains multiple vulnerabilities in its Test Script feat
546 CVE-2025-3835
1.04%
77.1th 9.6 This vulnerability allows remote attackers to execute arbitrary code on ManageEngine Exchange Report
547 CVE-2025-4524
1.04%
77.1th 9.8 This vulnerability allows unauthenticated attackers to include and execute arbitrary files on WordPr
548 CVE-2025-25286
1.04%
77th 9.8 CVE-2025-25286 is a critical remote code execution vulnerability in Crayfish's Homarus microservice
549 CVE-2024-57428
1.03%
77th 9.3 A stored cross-site scripting vulnerability in PHPJabbers Cinema Booking System v2.0 allows attacker
550 CVE-2025-26623
1.03%
76.9th 9.8 A heap buffer overflow vulnerability in Exiv2 versions 0.28.0 through 0.28.4 allows attackers to pot

What is EPSS?

The Exploit Prediction Scoring System (EPSS) is a data-driven model developed by FIRST.org that estimates the probability a CVE will be exploited in the wild within the next 30 days. Unlike CVSS which measures severity, EPSS measures likelihood of exploitation — making it ideal for prioritizing which vulnerabilities to patch first.

Why EPSS matters: With thousands of CVEs published monthly, not all vulnerabilities are equally dangerous. EPSS helps security teams focus on the CVEs most likely to be actively exploited, rather than patching solely by CVSS score. A critical CVSS 9.8 vulnerability with 0.1% EPSS may be less urgent than a high CVSS 7.5 with 90% EPSS.

Prioritize by Exploit Risk

Scan your servers and see which vulnerabilities have the highest EPSS scores. Focus on what attackers are actually targeting.

Start Monitoring Free