Most Exploitable CVEs - EPSS Rankings
CVEs ranked by EPSS (Exploit Prediction Scoring System) probability. Higher scores mean a greater likelihood of exploitation in the wild within the next 30 days.
| Rank | CVE ID | EPSS Score | Percentile | CVSS | Flags | Summary |
|---|---|---|---|---|---|---|
| 551 | CVE-2025-48927 |
|
89.9th | 5.3 | KEV | The TeleMessage service exposes a Spring Boot Actuator heap dump endpoint at /heapdump, allowing att |
| 552 | CVE-2024-13180 |
|
89.9th | 7.5 | CVE-2024-13180 is a path traversal vulnerability in Ivanti Avalanche that allows remote unauthentica | |
| 553 | CVE-2024-12583 |
|
89.8th | 9.9 | The Dynamics 365 Integration plugin for WordPress has a Server-Side Template Injection vulnerability | |
| 554 | CVE-2025-22462 |
|
89.8th | 9.8 | An authentication bypass vulnerability in Ivanti Neurons for ITSM on-premises deployments allows rem | |
| 555 | CVE-2025-57200 |
|
89.8th | 6.5 | This CVE describes an authenticated command injection vulnerability in AVTECH SECURITY Corporation's | |
| 556 | CVE-2025-21348 |
|
89.7th | 7.2 | This vulnerability allows remote attackers to execute arbitrary code on Microsoft SharePoint Server | |
| 557 | CVE-2025-34038 |
|
89.7th | 7.5 | This SQL injection vulnerability in Weaver e-cology 8.0 allows unauthenticated attackers to execute | |
| 558 | CVE-2024-13742 |
|
89.6th | 9.8 | The iControlWP WordPress plugin is vulnerable to PHP object injection via deserialization of untrust | |
| 559 | CVE-2025-23025 |
|
89.5th | 9.0 | In XWiki Platform, users with only edit rights can join realtime editing sessions and insert script | |
| 560 | CVE-2026-1687 |
|
89.5th | 7.3 | This CVE describes a command injection vulnerability in Tenda HG10 routers through the Boa webserver | |
| 561 | CVE-2025-24984 |
|
89.4th | 4.6 | KEV | This vulnerability allows sensitive information to be written to Windows NTFS log files, which could |
| 562 | CVE-2025-4123 |
|
89.4th | 7.6 | This CVE describes a cross-site scripting (XSS) vulnerability in Grafana that combines client path t | |
| 563 | CVE-2026-1207 |
|
89.4th | 5.4 | This SQL injection vulnerability in Django's RasterField implementation for PostGIS allows remote at | |
| 564 | CVE-2025-29062 |
|
89.4th | 9.8 | This vulnerability allows remote attackers to execute arbitrary code on BL-AC2100 routers by exploit | |
| 565 | CVE-2024-53842 |
|
89.4th | 9.8 | This critical vulnerability allows remote attackers to execute arbitrary code on affected Android de | |
| 566 | CVE-2025-1743 |
|
89.4th | 5.3 | This critical vulnerability in Pichome 2.1.0 allows remote attackers to perform path traversal attac | |
| 567 | CVE-2025-20393 |
|
89.4th | 10.0 | KEV | An unauthenticated remote attacker can execute arbitrary system commands with root privileges on Cis |
| 568 | CVE-2025-3729 |
|
89.3th | 7.3 | This critical vulnerability allows remote attackers to execute arbitrary operating system commands o | |
| 569 | CVE-2025-3520 |
|
89.3th | 8.1 | The Avatar WordPress plugin has an arbitrary file deletion vulnerability that allows authenticated a | |
| 570 | CVE-2025-59403 |
|
89.3th | 9.8 | The Flock Safety Collins Android app exposes unauthenticated administrative API endpoints on port 80 | |
| 571 | CVE-2023-53962 |
|
89.3th | 7.5 | CVE-2023-53962 is an unauthenticated directory traversal vulnerability in SOUND4 IMPACT/FIRST/PULSE/ | |
| 572 | CVE-2025-2594 |
|
89.3th | 8.1 | This vulnerability in the User Registration & Membership WordPress plugin allows attackers to authen | |
| 573 | CVE-2024-48589 |
|
89.2th | 6.3 | This is a Cross-Site Scripting (XSS) vulnerability in Gilnei Moraes phpABook v0.9 that allows remote | |
| 574 | CVE-2025-1550 |
|
89.2th | 9.8 | CVE-2025-1550 is a critical remote code execution vulnerability in Keras where the Model.load_model | |
| 575 | CVE-2024-48841 |
|
89.2th | 10.0 | This critical vulnerability in FLXEON software allows remote attackers to execute arbitrary code wit | |
| 576 | CVE-2025-0851 |
|
89.1th | 9.8 | A path traversal vulnerability in Deep Java Library's ZipUtils.unzip and TarUtils.untar functions al | |
| 577 | CVE-2025-57789 |
|
89.1th | 5.4 | This vulnerability allows remote attackers to gain administrative control of affected systems by exp | |
| 578 | CVE-2025-23209 |
|
89.1th | 8.0 | KEV | This is a remote code execution vulnerability in Craft CMS versions 4 and 5 that allows attackers to |
| 579 | CVE-2025-22949 |
|
89.1th | 9.8 | This vulnerability allows remote attackers to execute arbitrary commands on Tenda AC9 routers by inj | |
| 580 | CVE-2025-27780 |
|
89th | 9.8 | This vulnerability allows remote attackers to execute arbitrary code on Applio voice conversion tool | |
| 581 | CVE-2025-54313 |
|
89th | 7.5 | KEV | This CVE describes a supply chain compromise where malicious versions of eslint-config-prettier cont |
| 582 | CVE-2025-44860 |
|
88.9th | 6.5 | This CVE describes a command injection vulnerability in TOTOLINK CA300-POE routers that allows attac | |
| 583 | CVE-2025-44848 |
|
88.9th | 6.5 | This CVE describes a command injection vulnerability in TOTOLINK CA600-PoE routers that allows attac | |
| 584 | CVE-2025-44844 |
|
88.9th | 6.5 | This CVE describes a command injection vulnerability in TOTOLINK CA600-PoE routers that allows attac | |
| 585 | CVE-2025-44842 |
|
88.9th | 6.5 | This CVE describes a command injection vulnerability in TOTOLINK CA600-PoE routers that allows attac | |
| 586 | CVE-2025-44840 |
|
88.9th | 6.5 | This CVE describes a command injection vulnerability in TOTOLINK CA600-PoE routers that allows attac | |
| 587 | CVE-2024-8673 |
|
88.8th | 9.1 | The Z-Downloads WordPress plugin before version 1.11.7 fails to properly validate uploaded SVG files | |
| 588 | CVE-2025-3439 |
|
88.8th | 9.8 | The Everest Forms WordPress plugin is vulnerable to PHP object injection via deserialization of untr | |
| 589 | CVE-2024-48197 |
|
88.8th | 4.7 | This cross-site scripting (XSS) vulnerability in Audiocodes MP-202b version 4.4.3 allows attackers t | |
| 590 | CVE-2025-67254 |
|
88.8th | 7.5 | NagiosXI 2026R1.0.1 build 1762361101 contains a directory traversal vulnerability in /admin/coreconf | |
| 591 | CVE-2024-48760 |
|
88.7th | 9.8 | CVE-2024-48760 is a critical remote code execution vulnerability in GestioIP v3.5.7 that allows atta | |
| 592 | CVE-2025-57808 |
|
88.7th | 8.1 | This authentication bypass vulnerability in ESPHome allows attackers to access web server functional | |
| 593 | CVE-2025-24472 |
|
88.7th | 8.1 | KEV | This authentication bypass vulnerability in FortiOS and FortiProxy allows remote unauthenticated att |
| 594 | CVE-2025-6802 |
|
88.7th | 9.8 | This vulnerability allows unauthenticated remote attackers to upload arbitrary files to Marvell QCon | |
| 595 | CVE-2026-1689 |
|
88.7th | 7.3 | This CVE describes a remote command injection vulnerability in Tenda HG10 routers. Attackers can exe | |
| 596 | CVE-2024-13545 |
|
88.6th | 9.8 | The Bootstrap Ultimate WordPress theme contains a Local File Inclusion vulnerability that allows una | |
| 597 | CVE-2025-31486 |
|
88.6th | 5.3 | This vulnerability in Vite allows attackers to bypass file access restrictions and read arbitrary fi | |
| 598 | CVE-2024-13483 |
|
88.6th | 7.5 | This SQL injection vulnerability in the LTL Freight Quotes – SAIA Edition WordPress plugin allows | |
| 599 | CVE-2024-13479 |
|
88.6th | 7.5 | This SQL injection vulnerability in the LTL Freight Quotes WordPress plugin allows unauthenticated a | |
| 600 | CVE-2024-13489 |
|
88.6th | 7.5 | This SQL injection vulnerability in the LTL Freight Quotes WordPress plugin allows unauthenticated a |
What is EPSS?
The Exploit Prediction Scoring System (EPSS) is a data-driven model developed by FIRST.org that estimates the probability a CVE will be exploited in the wild within the next 30 days. Unlike CVSS which measures severity, EPSS measures likelihood of exploitation — making it ideal for prioritizing which vulnerabilities to patch first.
Why EPSS matters: With thousands of CVEs published monthly, not all vulnerabilities are equally dangerous. EPSS helps security teams focus on the CVEs most likely to be actively exploited, rather than patching solely by CVSS score. A critical CVSS 9.8 vulnerability with 0.1% EPSS may be less urgent than a high CVSS 7.5 with 90% EPSS.
Prioritize by Exploit Risk
Scan your servers and see which vulnerabilities have the highest EPSS scores. Focus on what attackers are actually targeting.
Start Monitoring Free