Most Exploitable CVEs - EPSS Rankings
CVEs ranked by EPSS (Exploit Prediction Scoring System) probability. Higher scores mean a greater likelihood of exploitation in the wild within the next 30 days.
| Rank | CVE ID | EPSS Score | Percentile | CVSS | Flags | Summary |
|---|---|---|---|---|---|---|
| 5851 | CVE-2025-12335 |
|
17.4th | 4.3 | This vulnerability allows attackers to inject malicious scripts into the supplier_update.php page of | |
| 5852 | CVE-2025-12334 |
|
17.4th | 4.3 | This vulnerability allows attackers to inject malicious scripts into the product name, description, | |
| 5853 | CVE-2025-12333 |
|
17.4th | 4.3 | This vulnerability in code-projects E-Commerce Website 1.0 allows attackers to inject malicious scri | |
| 5854 | CVE-2025-12201 |
|
17.3th | 4.7 | This vulnerability allows remote attackers to upload arbitrary files through the image parameter in | |
| 5855 | CVE-2025-31997 |
|
17.3th | 4.2 | HCL Unica Centralized Offer Management has an Insecure Direct Object Reference (IDOR) vulnerability | |
| 5856 | CVE-2025-0608 |
|
17.3th | 5.5 | This CVE describes an open redirect vulnerability in Logo Software Inc.'s Logo Cloud platform that a | |
| 5857 | CVE-2025-60796 |
|
17.4th | 6.1 | phpPgAdmin 7.13.0 and earlier contains multiple cross-site scripting (XSS) vulnerabilities where use | |
| 5858 | CVE-2025-60708 |
|
17.4th | 6.5 | CVE-2025-60708 is an untrusted pointer dereference vulnerability in the Storvsp.sys driver that allo | |
| 5859 | CVE-2025-60706 |
|
17.4th | 5.5 | This vulnerability allows an authorized attacker with local access to a Windows Hyper-V host to read | |
| 5860 | CVE-2025-59513 |
|
17.4th | 5.5 | This vulnerability allows an authorized attacker to read memory outside the intended buffer in Windo | |
| 5861 | CVE-2025-64179 |
|
17.4th | 5.3 | This vulnerability in lakeFS allows unauthenticated access to the /api/v1/usage-report/summary endpo | |
| 5862 | CVE-2025-20377 |
|
17.2th | 4.3 | An authenticated information disclosure vulnerability in Cisco Unified Intelligence Center allows lo | |
| 5863 | CVE-2025-36091 |
|
17.4th | 4.3 | This vulnerability in IBM Cloud Pak for Business Automation allows authenticated users to assign inv | |
| 5864 | CVE-2025-15154 |
|
17.4th | 5.3 | This vulnerability in PbootCMS allows attackers to spoof IP addresses by manipulating the X-Forwarde | |
| 5865 | CVE-2025-60070 |
|
17.3th | 6.5 | This CVE describes a code injection vulnerability in the Molla WordPress theme that allows attackers | |
| 5866 | CVE-2025-60068 |
|
17.3th | 6.5 | This CVE describes a code injection vulnerability in the Javo Core WordPress plugin that allows atta | |
| 5867 | CVE-2025-64633 |
|
17.3th | 5.3 | This is a cross-site scripting (XSS) vulnerability in the Norebro Extra WordPress plugin that allows | |
| 5868 | CVE-2025-13891 |
|
17.3th | 6.5 | This vulnerability allows authenticated WordPress users with Author-level permissions or higher to p | |
| 5869 | CVE-2025-64702 |
|
17.3th | 5.3 | quic-go versions 0.56.0 and below are vulnerable to memory exhaustion attacks through HTTP/3 QPACK h | |
| 5870 | CVE-2025-56429 |
|
17.3th | 6.1 | This Cross-Site Scripting (XSS) vulnerability in FearlessCMS allows attackers to inject malicious sc | |
| 5871 | CVE-2025-63068 |
|
17.3th | 5.3 | This vulnerability allows attackers to inject malicious scripts into web pages using the Contact For | |
| 5872 | CVE-2025-64056 |
|
17.4th | 4.3 | An unauthenticated file upload vulnerability in Fanvil x210 V2 IP phones allows attackers on the loc | |
| 5873 | CVE-2025-12826 |
|
17.5th | 4.8 | The Custom Post Type UI WordPress plugin has an authorization bypass vulnerability that allows authe | |
| 5874 | CVE-2025-66307 |
|
17.3th | 6.5 | This vulnerability in Grav's admin plugin allows attackers to enumerate valid usernames and discover | |
| 5875 | CVE-2026-1549 |
|
17.4th | 4.3 | This CVE describes a path traversal vulnerability in jishenghua jshERP's PluginController component. | |
| 5876 | CVE-2026-23960 |
|
17.4th | 5.4 | This stored cross-site scripting (XSS) vulnerability in Argo Workflows allows workflow authors to in | |
| 5877 | CVE-2021-47870 |
|
17.4th | 5.4 | This stored XSS vulnerability in GetSimple CMS My SMTP Contact Plugin allows attackers to inject mal | |
| 5878 | CVE-2026-20821 |
|
17.5th | 6.2 | This Windows Remote Procedure Call vulnerability allows unauthorized local attackers to access sensi | |
| 5879 | CVE-2026-20818 |
|
17.5th | 6.2 | This vulnerability allows sensitive information to be written to log files in the Windows Kernel, po | |
| 5880 | CVE-2026-22693 |
|
17.4th | 5.3 | A null pointer dereference vulnerability in HarfBuzz text shaping engine allows attackers to cause a | |
| 5881 | CVE-2026-25543 |
|
17.3th | 6.1 | HtmlSanitizer versions before 9.0.892 and 9.1.893-beta fail to sanitize content within template tags | |
| 5882 | CVE-2026-24933 |
|
17.4th | 5.9 | This vulnerability allows unauthenticated remote attackers to perform Man-in-the-Middle attacks by i | |
| 5883 | CVE-2024-31906 |
|
17.2th | 6.2 | IBM Automation Decision Services 23.0.2 stores web pages locally in a way that allows other users on | |
| 5884 | CVE-2025-23227 |
|
17th | 6.4 | IBM Tivoli Application Dependency Discovery Manager versions 7.3.0.0 through 7.3.0.11 contain a stor | |
| 5885 | CVE-2024-51457 |
|
17th | 4.4 | This CVE describes a cross-site scripting (XSS) vulnerability in IBM Robotic Process Automation for | |
| 5886 | CVE-2024-57940 |
|
17th | 5.5 | A denial-of-service vulnerability in the Linux kernel's exFAT filesystem driver where a corrupted fi | |
| 5887 | CVE-2024-12328 |
|
17.2th | 6.4 | The MAS Elementor WordPress plugin allows authenticated attackers with Author-level access or higher | |
| 5888 | CVE-2022-49654 |
|
17th | 5.5 | A vulnerability in the Linux kernel's Qualcomm Atheros QCA8K Ethernet switch driver causes network d | |
| 5889 | CVE-2022-49510 |
|
17th | 5.5 | This CVE describes a NULL pointer dereference vulnerability in the Linux kernel's OMAP DRM driver. A | |
| 5890 | CVE-2022-49417 |
|
17th | 5.5 | A NULL pointer dereference vulnerability in the iwlwifi driver's MEI component in the Linux kernel c | |
| 5891 | CVE-2022-49408 |
|
17th | 5.5 | A memory leak vulnerability in the Linux kernel's ext4 filesystem driver allows attackers to cause k | |
| 5892 | CVE-2022-49333 |
|
17th | 5.5 | A race condition vulnerability in the Linux kernel's mlx5 driver where mlx5_get_next_phys_dev() is c | |
| 5893 | CVE-2022-49306 |
|
17th | 5.5 | This CVE addresses a resource leak vulnerability in the Linux kernel's USB DWC3 host controller driv | |
| 5894 | CVE-2024-28776 |
|
17th | 5.4 | This cross-site scripting (XSS) vulnerability in IBM Cognos Controller allows attackers to inject ma | |
| 5895 | CVE-2025-24889 |
|
16.9th | 4.5 | A path traversal vulnerability in SecureDrop Client allows attackers with existing code execution in | |
| 5896 | CVE-2024-57959 |
|
17th | 6.1 | A Use-After-Free vulnerability in the display module allows attackers to exploit memory corruption a | |
| 5897 | CVE-2024-38318 |
|
17.2th | 4.8 | IBM Aspera Shares versions 1.9.0 through 1.10.0 PL6 are vulnerable to HTML injection, allowing attac | |
| 5898 | CVE-2025-24097 |
|
17.1th | 5.0 | A permissions vulnerability in Apple operating systems allows applications to read arbitrary file me | |
| 5899 | CVE-2025-2688 |
|
17.1th | 4.3 | This vulnerability in TOTOLINK A3000RU routers allows improper access to the Syslog configuration fi | |
| 5900 | CVE-2024-10445 |
|
16.9th | 4.3 | This CVE describes an improper certificate validation vulnerability in Synology BeeStation OS and Di |
What is EPSS?
The Exploit Prediction Scoring System (EPSS) is a data-driven model developed by FIRST.org that estimates the probability a CVE will be exploited in the wild within the next 30 days. Unlike CVSS which measures severity, EPSS measures likelihood of exploitation — making it ideal for prioritizing which vulnerabilities to patch first.
Why EPSS matters: With thousands of CVEs published monthly, not all vulnerabilities are equally dangerous. EPSS helps security teams focus on the CVEs most likely to be actively exploited, rather than patching solely by CVSS score. A critical CVSS 9.8 vulnerability with 0.1% EPSS may be less urgent than a high CVSS 7.5 with 90% EPSS.
Prioritize by Exploit Risk
Scan your servers and see which vulnerabilities have the highest EPSS scores. Focus on what attackers are actually targeting.
Start Monitoring Free