Most Exploitable CVEs - EPSS Rankings
CVEs ranked by EPSS (Exploit Prediction Scoring System) probability. Higher scores mean a greater likelihood of exploitation in the wild within the next 30 days.
| Rank | CVE ID | EPSS Score | Percentile | CVSS | Flags | Summary |
|---|---|---|---|---|---|---|
| 5701 | CVE-2025-3205 |
|
41.7th | 6.3 | A critical SQL injection vulnerability in CodeAstro Student Grading System 1.0 allows remote attacke | |
| 5702 | CVE-2025-3141 |
|
41.7th | 6.3 | This critical SQL injection vulnerability in SourceCodester Online Medicine Ordering System 1.0 allo | |
| 5703 | CVE-2025-3134 |
|
41.7th | 6.3 | A critical SQL injection vulnerability in code-projects Payroll Management System 1.0 allows remote | |
| 5704 | CVE-2025-3119 |
|
41.7th | 6.3 | This is a critical SQL injection vulnerability in SourceCodester Online Tutor Portal 1.0 that allows | |
| 5705 | CVE-2025-3118 |
|
41.7th | 6.3 | CVE-2025-3118 is a critical SQL injection vulnerability in SourceCodester Online Tutor Portal 1.0 th | |
| 5706 | CVE-2025-48075 |
|
41.5th | 7.5 | A denial-of-service vulnerability in Go's Fiber web framework allows attackers to crash applications | |
| 5707 | CVE-2025-29157 |
|
41.6th | 6.5 | This vulnerability in petstore v1.0.7 allows remote attackers to execute arbitrary code by accessing | |
| 5708 | CVE-2025-10542 |
|
41.5th | 9.8 | iMonitor EAM 9.6394 ships with hardcoded default administrative credentials that are visible in the | |
| 5709 | CVE-2025-62416 |
|
41.5th | 5.1 | Bagisto v2.3.7 has a Server-Side Template Injection vulnerability in product description rendering t | |
| 5710 | CVE-2025-9512 |
|
41.5th | 6.1 | This vulnerability in the Schema & Structured Data for WP & AMP WordPress plugin allows unauthentica | |
| 5711 | CVE-2025-69276 |
|
41.5th | 8.8 | A deserialization vulnerability in Broadcom DX NetOps Spectrum allows attackers to inject malicious | |
| 5712 | CVE-2025-67189 |
|
41.7th | 6.5 | A buffer overflow vulnerability in TOTOLINK A950RG routers allows remote attackers to cause denial o | |
| 5713 | CVE-2024-54530 |
|
41.5th | 9.1 | This vulnerability allows password autofill to fill passwords even after authentication fails, poten | |
| 5714 | CVE-2024-50953 |
|
41.5th | 7.5 | This vulnerability in XINJE XL5E-16T programmable logic controllers allows attackers to send special | |
| 5715 | CVE-2025-21323 |
|
41.5th | 5.5 | This Windows kernel vulnerability allows attackers to read sensitive memory information from the ker | |
| 5716 | CVE-2025-21320 |
|
41.5th | 5.5 | This Windows kernel vulnerability allows attackers to read sensitive kernel memory information, pote | |
| 5717 | CVE-2025-21318 |
|
41.5th | 5.5 | This Windows kernel vulnerability allows attackers to read sensitive memory information from the ker | |
| 5718 | CVE-2024-25371 |
|
41.5th | 7.5 | This vulnerability in Gramine allows attackers to potentially bypass security boundaries by exploiti | |
| 5719 | CVE-2025-27108 |
|
41.5th | 7.3 | This vulnerability allows attackers to execute arbitrary JavaScript in victims' browsers through Cro | |
| 5720 | CVE-2025-1340 |
|
41.5th | 8.8 | A critical stack-based buffer overflow vulnerability in TOTOLINK X18 routers allows remote attackers | |
| 5721 | CVE-2024-13749 |
|
41.4th | 6.1 | The StaffList WordPress plugin up to version 3.2.3 has a CSRF vulnerability that allows unauthentica | |
| 5722 | CVE-2024-57085 |
|
41.5th | 7.5 | This CVE describes a prototype pollution vulnerability in the deepMerge function of @stryker-mutator | |
| 5723 | CVE-2025-24095 |
|
41.5th | 7.6 | This vulnerability allows applications to bypass privacy preferences on affected Apple operating sys | |
| 5724 | CVE-2025-2252 |
|
41.4th | 5.3 | The Easy Digital Downloads WordPress plugin exposes private download post titles to unauthenticated | |
| 5725 | CVE-2024-8196 |
|
41.4th | 9.8 | The Anything-LLM desktop application for Windows opens port 3001 on all network interfaces (0.0.0.0) | |
| 5726 | CVE-2025-4477 |
|
41.5th | 7.2 | CVE-2025-4477 is a privilege escalation vulnerability in TeamT5's ThreatSonar Anti-Ransomware softwa | |
| 5727 | CVE-2024-6584 |
|
41.5th | 9.1 | This vulnerability in WordPress allows administrators to make arbitrary GET requests to any URL thro | |
| 5728 | CVE-2025-31493 |
|
41.5th | 9.1 | This is a path traversal vulnerability in Kirby CMS that allows attackers to access and execute arbi | |
| 5729 | CVE-2025-3460 |
|
41.5th | 7.7 | The Quantenna Wi-Fi chipset's set_tx_pow script is vulnerable to command injection, allowing local a | |
| 5730 | CVE-2025-45346 |
|
41.5th | 8.1 | This SQL injection vulnerability in Bacula-web allows remote attackers to execute arbitrary SQL comm | |
| 5731 | CVE-2025-52456 |
|
41.5th | 8.8 | A memory corruption vulnerability in the SAIL Image Decoding Library's WebP animation decoder allows | |
| 5732 | CVE-2025-10745 |
|
41.5th | 5.3 | This vulnerability allows unauthenticated attackers to bypass the Banhammer WordPress plugin's traff | |
| 5733 | CVE-2025-9216 |
|
41.5th | 8.8 | The StoreEngine WordPress plugin up to version 1.5.0 has an arbitrary file upload vulnerability in i | |
| 5734 | CVE-2025-60964 |
|
41.4th | 9.1 | This CVE describes an OS command injection vulnerability in EndRun Technologies Sonoma D12 Network T | |
| 5735 | CVE-2024-11976 |
|
41.4th | 7.3 | This vulnerability in the BuddyPress WordPress plugin allows unauthenticated attackers to execute ar | |
| 5736 | CVE-2024-35280 |
|
41.5th | 5.4 | This vulnerability allows attackers to perform reflected cross-site scripting (XSS) attacks against | |
| 5737 | CVE-2025-23212 |
|
41.3th | 7.7 | CVE-2025-23212 is an information disclosure vulnerability in Tandoor Recipes that allows any user to | |
| 5738 | CVE-2025-24143 |
|
41.3th | 6.5 | This vulnerability allows malicious webpages to bypass file system access restrictions and fingerpri | |
| 5739 | CVE-2025-21543 |
|
41.3th | 4.9 | This vulnerability in Oracle MySQL Server allows high-privileged attackers with network access to ca | |
| 5740 | CVE-2025-21505 |
|
41.3th | 4.9 | This vulnerability in Oracle MySQL Server allows high-privileged attackers with network access to ca | |
| 5741 | CVE-2025-21503 |
|
41.3th | 4.9 | This vulnerability in MySQL Server's InnoDB component allows high-privileged attackers with network | |
| 5742 | CVE-2025-21492 |
|
41.3th | 4.9 | This vulnerability in MySQL Server's Optimizer component allows high-privileged attackers with netwo | |
| 5743 | CVE-2025-24013 |
|
41.4th | 5.3 | CodeIgniter versions before 4.5.8 lack proper validation for HTTP header names and values, allowing | |
| 5744 | CVE-2024-57768 |
|
41.3th | 9.8 | This SQL injection vulnerability in JFinalOA allows attackers to execute arbitrary SQL commands thro | |
| 5745 | CVE-2025-0436 |
|
41.3th | 8.8 | This integer overflow vulnerability in Chrome's Skia graphics engine allows remote attackers to trig | |
| 5746 | CVE-2024-13253 |
|
41.3th | 9.1 | This CVE describes an incorrect authorization vulnerability in Drupal's Advanced PWA inc Push Notifi | |
| 5747 | CVE-2025-22386 |
|
41.3th | 7.3 | This vulnerability allows session tokens from logged-out users to remain active and usable in Optimi | |
| 5748 | CVE-2025-23193 |
|
41.3th | 5.3 | CVE-2025-23193 is an information disclosure vulnerability in SAP NetWeaver Server ABAP that allows u | |
| 5749 | CVE-2025-24899 |
|
41.3th | 7.5 | This vulnerability in reNgine allows any authenticated user (including those with low-privilege role | |
| 5750 | CVE-2019-25325 |
|
41.3th | 8.2 | CVE-2019-25325 is an SQL injection vulnerability in Thrive Smart Home 1.1 that allows unauthenticate |
What is EPSS?
The Exploit Prediction Scoring System (EPSS) is a data-driven model developed by FIRST.org that estimates the probability a CVE will be exploited in the wild within the next 30 days. Unlike CVSS which measures severity, EPSS measures likelihood of exploitation — making it ideal for prioritizing which vulnerabilities to patch first.
Why EPSS matters: With thousands of CVEs published monthly, not all vulnerabilities are equally dangerous. EPSS helps security teams focus on the CVEs most likely to be actively exploited, rather than patching solely by CVSS score. A critical CVSS 9.8 vulnerability with 0.1% EPSS may be less urgent than a high CVSS 7.5 with 90% EPSS.
Prioritize by Exploit Risk
Scan your servers and see which vulnerabilities have the highest EPSS scores. Focus on what attackers are actually targeting.
Start Monitoring Free