Most Exploitable CVEs - EPSS Rankings

CVEs ranked by EPSS (Exploit Prediction Scoring System) probability. Higher scores mean a greater likelihood of exploitation in the wild within the next 30 days.

164
EPSS > 50%
156
CISA KEV Listed
35,468
CVEs with EPSS
0.7%
Avg EPSS Score
All Critical High Medium Low
Rank CVE ID EPSS Score Percentile CVSS Flags Summary
551 CVE-2020-36859
1.16%
78.2th 8.8 This SQL injection vulnerability in Nagios XI's Core Config Manager allows authenticated users to in
552 CVE-2016-15050
1.16%
78.2th 8.8 Nagios XI versions before 5.2.4 contain a SQL injection vulnerability in the notification search fea
553 CVE-2025-60962
1.16%
78.2th 8.2 This CVE describes an OS command injection vulnerability in EndRun Technologies Sonoma D12 Network T
554 CVE-2025-60959
1.16%
78.2th 8.2 This CVE describes an OS command injection vulnerability in EndRun Technologies Sonoma D12 Network T
555 CVE-2024-13094
1.15%
78.1th 7.1 This vulnerability allows attackers to inject malicious scripts into WordPress admin pages via unsan
556 CVE-2025-58429
1.15%
78.1th 7.5 An unauthenticated remote attacker can exploit a relative path traversal vulnerability in Productivi
557 CVE-2025-10090
1.14%
78.1th 7.3 This CVE describes a SQL injection vulnerability in Jinher OA software up to version 1.2, specifical
558 CVE-2025-3328
1.14%
78th 8.8 A critical buffer overflow vulnerability in Tenda AC1206 routers allows remote attackers to execute
559 CVE-2025-27737
1.14%
78th 8.6 This vulnerability allows a local attacker to bypass Windows Security Zone Mapping through improper
560 CVE-2023-37032
1.13%
78th 7.5 A stack-based buffer overflow vulnerability in Magma's Mobile Management Entity (MME) allows remote
561 CVE-2025-24962
1.13%
78th 8.8 CVE-2025-24962 is a command injection vulnerability in reNgine's nmap_cmd parameter that allows auth
562 CVE-2025-4350
1.13%
78th 8.8 A critical command injection vulnerability in D-Link DIR-600L routers allows remote attackers to exe
563 CVE-2024-12556
1.12%
77.9th 8.7 This vulnerability allows attackers to exploit prototype pollution in Kibana to achieve code injecti
564 CVE-2025-64444
1.12%
77.9th 7.2 This OS command injection vulnerability in NCP-HG100 network devices allows authenticated attackers
565 CVE-2024-13899
1.12%
77.8th 7.2 The Mambo Importer WordPress plugin is vulnerable to PHP object injection via deserialization of unt
566 CVE-2022-50790
1.12%
77.8th 7.5 This vulnerability allows unauthenticated remote attackers to access live radio stream information f
567 CVE-2026-20098
1.11%
77.8th 8.8 This vulnerability in Cisco Meeting Management allows authenticated attackers with video operator pr
568 CVE-2026-20045
1.1%
77.7th 8.2 KEV This critical vulnerability allows unauthenticated remote attackers to execute arbitrary commands on
569 CVE-2025-0366
1.1%
77.6th 8.8 The Jupiter X Core WordPress plugin has a Local File Inclusion vulnerability that leads to Remote Co
570 CVE-2025-26866
1.09%
77.6th 8.8 This CVE describes a remote code execution vulnerability in Apache HugeGraph's PD store where a mali
571 CVE-2025-57201
1.09%
77.6th 8.8 This CVE describes an authenticated command injection vulnerability in AVTECH SECURITY Corporation's
572 CVE-2025-24993
1.09%
77.6th 7.8 KEV A heap-based buffer overflow vulnerability in Windows NTFS allows local attackers to execute arbitra
573 CVE-2024-43649
1.08%
77.5th 8.8 Authenticated command injection in Iocharger AC charging station firmware allows attackers with low-
574 CVE-2024-13720
1.08%
77.5th 8.8 The WP Image Uploader WordPress plugin allows unauthenticated attackers to delete arbitrary files on
575 CVE-2024-13696
1.08%
77.5th 7.2 This vulnerability allows unauthenticated attackers to inject malicious JavaScript into WordPress si
576 CVE-2025-2801
1.08%
77.4th 7.3 This vulnerability allows unauthenticated attackers to execute arbitrary WordPress shortcodes throug
577 CVE-2025-0566
1.07%
77.4th 8.8 A critical stack-based buffer overflow vulnerability in Tenda AC15 routers allows remote attackers t
578 CVE-2025-3546
1.07%
77.4th 8.0 This critical vulnerability in H3C Magic routers allows authenticated attackers on the local network
579 CVE-2025-27038
1.07%
77.4th 7.5 KEV This vulnerability allows memory corruption in Chrome's graphics rendering through Adreno GPU driver
580 CVE-2025-48492
1.06%
77.3th 8.8 This vulnerability allows authenticated users with Edit component access in GetSimple CMS to inject
581 CVE-2026-0772
1.06%
77.3th 7.5 This vulnerability allows authenticated remote attackers to execute arbitrary code on Langflow insta
582 CVE-2025-28059
1.06%
77.3th 7.5 This vulnerability allows deleted users in Nagios Network Analyzer to maintain access to restricted
583 CVE-2025-14501
1.06%
77.2th 7.5 This vulnerability allows remote attackers to crash Sante PACS Server by sending specially crafted H
584 CVE-2025-56123
1.06%
77.2th 8.8 This CVE describes an OS command injection vulnerability in Ruijie RG-EW1200G PRO wireless access po
585 CVE-2025-56122
1.06%
77.2th 8.8 This CVE describes an OS command injection vulnerability in Ruijie RG-EW1800GX PRO wireless access p
586 CVE-2025-56120
1.06%
77.2th 8.8 This CVE describes an OS command injection vulnerability in Ruijie X60 PRO routers that allows attac
587 CVE-2025-56118
1.06%
77.2th 8.8 This CVE describes an OS command injection vulnerability in Ruijie X60 PRO routers that allows attac
588 CVE-2025-56114
1.06%
77.2th 8.8 This CVE describes an OS command injection vulnerability in Ruijie M18 routers that allows attackers
589 CVE-2025-0956
1.05%
77.2th 8.1 This CVE describes a PHP object injection vulnerability in the WooCommerce Recover Abandoned Cart Wo
590 CVE-2024-55063
1.05%
77.2th 8.8 Multiple code injection vulnerabilities in EasyVirt DC NetScope allow remote authenticated attackers
591 CVE-2025-66474
1.05%
77.2th 8.8 CVE-2025-66474 is an HTML injection vulnerability in XWiki Rendering that allows authenticated users
592 CVE-2025-9935
1.05%
77.2th 7.3 This vulnerability allows remote attackers to execute arbitrary commands on TOTOLINK N600R routers v
593 CVE-2025-56130
1.05%
77.2th 8.8 This CVE describes an OS command injection vulnerability in Ruijie RG-S1930 switches that allows att
594 CVE-2025-1104
1.04%
77.1th 7.3 This critical vulnerability in D-Link DHP-W310AV powerline adapters allows remote attackers to bypas
595 CVE-2025-31674
1.04%
77.1th 7.5 This CVE describes an object injection vulnerability in Drupal core that allows attackers to modify
596 CVE-2024-54146
1.04%
77th 7.6 Cacti versions before 1.2.29 contain a SQL injection vulnerability in the host_templates.php templat
597 CVE-2025-21365
1.03%
77th 7.8 CVE-2025-21365 is a remote code execution vulnerability in Microsoft Office that allows attackers to
598 CVE-2025-2525
1.03%
77th 8.8 The Streamit WordPress theme allows authenticated users with subscriber-level permissions or higher
599 CVE-2025-6220
1.03%
76.9th 7.2 The Ultra Addons for Contact Form 7 WordPress plugin has a vulnerability that allows authenticated a
600 CVE-2025-6464
1.02%
76.9th 7.5 The Forminator WordPress plugin is vulnerable to PHP Object Injection via deserialization of untrust

What is EPSS?

The Exploit Prediction Scoring System (EPSS) is a data-driven model developed by FIRST.org that estimates the probability a CVE will be exploited in the wild within the next 30 days. Unlike CVSS which measures severity, EPSS measures likelihood of exploitation — making it ideal for prioritizing which vulnerabilities to patch first.

Why EPSS matters: With thousands of CVEs published monthly, not all vulnerabilities are equally dangerous. EPSS helps security teams focus on the CVEs most likely to be actively exploited, rather than patching solely by CVSS score. A critical CVSS 9.8 vulnerability with 0.1% EPSS may be less urgent than a high CVSS 7.5 with 90% EPSS.

Prioritize by Exploit Risk

Scan your servers and see which vulnerabilities have the highest EPSS scores. Focus on what attackers are actually targeting.

Start Monitoring Free