Most Exploitable CVEs - EPSS Rankings
CVEs ranked by EPSS (Exploit Prediction Scoring System) probability. Higher scores mean a greater likelihood of exploitation in the wild within the next 30 days.
| Rank | CVE ID | EPSS Score | Percentile | CVSS | Flags | Summary |
|---|---|---|---|---|---|---|
| 5451 | CVE-2025-23864 |
|
42.9th | 6.5 | This stored cross-site scripting (XSS) vulnerability in the WCS QR Code Generator WordPress plugin a | |
| 5452 | CVE-2025-23833 |
|
42.9th | 6.5 | This DOM-based Cross-Site Scripting (XSS) vulnerability in the WordPress Links/Problem Reporter plug | |
| 5453 | CVE-2025-23816 |
|
42.9th | 6.5 | This stored cross-site scripting (XSS) vulnerability in the Metaphor Widgets WordPress plugin allows | |
| 5454 | CVE-2025-23807 |
|
42.9th | 6.5 | This stored cross-site scripting (XSS) vulnerability in the Spiderpowa Embed PDF WordPress plugin al | |
| 5455 | CVE-2025-23802 |
|
42.9th | 6.5 | This stored cross-site scripting (XSS) vulnerability in WP-Revive Adserver allows attackers to injec | |
| 5456 | CVE-2025-23796 |
|
42.9th | 6.5 | This stored cross-site scripting (XSS) vulnerability in the Easy Portfolio WordPress plugin allows a | |
| 5457 | CVE-2025-23794 |
|
42.9th | 6.5 | This stored XSS vulnerability in the wp_amaps WordPress plugin allows attackers to inject malicious | |
| 5458 | CVE-2025-23777 |
|
42.9th | 6.5 | This stored cross-site scripting (XSS) vulnerability in the GDPR Personal Data Reports WordPress plu | |
| 5459 | CVE-2024-57623 |
|
43th | 7.5 | This vulnerability in MonetDB Server's HEAP_malloc component allows attackers to cause Denial of Ser | |
| 5460 | CVE-2024-57618 |
|
43th | 7.5 | A vulnerability in MonetDB Server's bind_col_exp component allows attackers to execute crafted SQL s | |
| 5461 | CVE-2024-45033 |
|
42.9th | 8.1 | This vulnerability allows users to maintain active sessions even after their passwords have been cha | |
| 5462 | CVE-2025-22384 |
|
42.9th | 7.5 | This vulnerability allows attackers to purchase discontinued products by manipulating requests befor | |
| 5463 | CVE-2025-1244 |
|
42.9th | 8.8 | A command injection vulnerability in Emacs allows remote attackers to execute arbitrary shell comman | |
| 5464 | CVE-2025-30203 |
|
42.9th | 4.8 | This CVE describes a cross-site scripting (XSS) vulnerability in Tuleap's RSS widget functionality. | |
| 5465 | CVE-2025-29218 |
|
42.9th | 6.5 | Tenda W18E v2.0 router firmware version 16.01.0.11 contains a stack overflow vulnerability in the wi | |
| 5466 | CVE-2025-2136 |
|
42.9th | 8.8 | A use-after-free vulnerability in Chrome's Inspector component allows remote attackers to potentiall | |
| 5467 | CVE-2025-32550 |
|
42.8th | 7.2 | This SQL injection vulnerability in the ClickandPledge Connect WordPress plugin allows attackers to | |
| 5468 | CVE-2025-30013 |
|
42.8th | 6.7 | SAP ERP BW Business Content contains function modules vulnerable to OS command injection, allowing a | |
| 5469 | CVE-2024-58132 |
|
42.9th | 4.0 | A race condition vulnerability in chainmaker-go (ChainMaker) allows concurrent read/write operations | |
| 5470 | CVE-2025-58157 |
|
42.9th | 7.5 | A denial of service vulnerability exists in gnark versions 0.12.0 where the fake-GLV algorithm for s | |
| 5471 | CVE-2025-9026 |
|
42.9th | 7.3 | This CVE describes a remote command injection vulnerability in D-Link DIR-860L routers via the Simpl | |
| 5472 | CVE-2025-61581 |
|
42.9th | 7.5 | This CVE describes an Inefficient Regular Expression Complexity (ReDoS) vulnerability in Apache Traf | |
| 5473 | CVE-2025-13692 |
|
42.9th | 7.2 | The Unlimited Elements For Elementor WordPress plugin allows unauthenticated attackers to upload mal | |
| 5474 | CVE-2025-12135 |
|
42.9th | 7.2 | The WPBookit WordPress plugin up to version 1.0.6 has a stored cross-site scripting vulnerability in | |
| 5475 | CVE-2025-64714 |
|
42.9th | 5.8 | CVE-2025-64714 is a Local File Inclusion vulnerability in PrivateBin's template-switching feature th | |
| 5476 | CVE-2025-66923 |
|
42.8th | 7.2 | This Cross-site scripting (XSS) vulnerability in Open Source Point of Sale v3.4.1 allows remote atta | |
| 5477 | CVE-2025-66921 |
|
42.8th | 7.2 | This Cross-site scripting (XSS) vulnerability in Open Source Point of Sale v3.4.1 allows remote atta | |
| 5478 | CVE-2025-67725 |
|
42.9th | 7.5 | A denial-of-service vulnerability in Tornado web framework allows a single malicious HTTP request to | |
| 5479 | CVE-2025-11727 |
|
42.9th | 7.2 | This stored XSS vulnerability in the Omnichannel for WooCommerce plugin allows unauthenticated attac | |
| 5480 | CVE-2024-57086 |
|
42.8th | 7.5 | This CVE describes a prototype pollution vulnerability in the fieldsToJson function of node-opcua-al | |
| 5481 | CVE-2024-57084 |
|
42.8th | 7.5 | This CVE describes a prototype pollution vulnerability in dot-properties v1.0.1's lib.parse function | |
| 5482 | CVE-2024-57071 |
|
42.8th | 7.5 | A prototype pollution vulnerability in php-parser's lib.combine function allows attackers to manipul | |
| 5483 | CVE-2024-57069 |
|
42.8th | 7.5 | This vulnerability is a prototype pollution flaw in expand-object v0.4.2 that allows attackers to in | |
| 5484 | CVE-2024-57063 |
|
42.8th | 7.5 | This vulnerability is a prototype pollution flaw in php-date-formatter v1.3.6 that allows attackers | |
| 5485 | CVE-2025-30218 |
|
42.5th | 5.9 | This Next.js vulnerability allows the x-middleware-subrequest-id header to be unintentionally leaked | |
| 5486 | CVE-2025-45997 |
|
42.7th | 8.6 | This vulnerability allows attackers to upload malicious PHP files disguised as images to the Web-bas | |
| 5487 | CVE-2025-47244 |
|
42.7th | 7.3 | This vulnerability in Inedo ProGet allows remote attackers to access restricted functionality throug | |
| 5488 | CVE-2024-58135 |
|
42.8th | 5.3 | Mojolicious applications created with 'mojo generate app' from version 7.28 use weak HMAC session co | |
| 5489 | CVE-2025-7692 |
|
42.8th | 8.1 | The Orion Login with SMS WordPress plugin has an authentication bypass vulnerability that allows una | |
| 5490 | CVE-2025-5060 |
|
42.8th | 8.1 | The Bravis User plugin for WordPress has an authentication bypass vulnerability that allows unauthen | |
| 5491 | CVE-2025-8802 |
|
42.7th | 5.3 | A denial-of-service vulnerability in Open5GS SMF component allows remote attackers to crash the serv | |
| 5492 | CVE-2024-41177 |
|
42.7th | 6.1 | Apache Zeppelin versions before 0.12.0 have an incomplete blacklist that fails to properly sanitize | |
| 5493 | CVE-2025-58133 |
|
42.8th | 5.3 | An authentication bypass vulnerability in Zoom Rooms Clients allows unauthenticated attackers to acc | |
| 5494 | CVE-2025-52867 |
|
42.7th | 6.5 | An uncontrolled resource consumption vulnerability in Qsync Central allows authenticated remote atta | |
| 5495 | CVE-2025-44012 |
|
42.7th | 6.5 | A resource exhaustion vulnerability in Qsync Central allows authenticated attackers to consume syste | |
| 5496 | CVE-2025-44006 |
|
42.7th | 6.5 | This vulnerability in Qsync Central allows authenticated remote attackers to perform resource exhaus | |
| 5497 | CVE-2025-33040 |
|
42.7th | 6.5 | This vulnerability in Qsync Central allows authenticated remote attackers to allocate resources with | |
| 5498 | CVE-2025-33039 |
|
42.7th | 6.5 | This vulnerability in Qsync Central allows authenticated remote attackers to exhaust system resource | |
| 5499 | CVE-2022-50694 |
|
42.8th | 9.8 | This SQL injection vulnerability in SOUND4 IMPACT/FIRST/PULSE/Eco systems allows attackers to bypass | |
| 5500 | CVE-2023-53960 |
|
42.8th | 9.8 | This SQL injection vulnerability in SOUND4 IMPACT/FIRST/PULSE/Eco version 2.x allows attackers to by |
What is EPSS?
The Exploit Prediction Scoring System (EPSS) is a data-driven model developed by FIRST.org that estimates the probability a CVE will be exploited in the wild within the next 30 days. Unlike CVSS which measures severity, EPSS measures likelihood of exploitation — making it ideal for prioritizing which vulnerabilities to patch first.
Why EPSS matters: With thousands of CVEs published monthly, not all vulnerabilities are equally dangerous. EPSS helps security teams focus on the CVEs most likely to be actively exploited, rather than patching solely by CVSS score. A critical CVSS 9.8 vulnerability with 0.1% EPSS may be less urgent than a high CVSS 7.5 with 90% EPSS.
Prioritize by Exploit Risk
Scan your servers and see which vulnerabilities have the highest EPSS scores. Focus on what attackers are actually targeting.
Start Monitoring Free