Most Exploitable CVEs - EPSS Rankings

CVEs ranked by EPSS (Exploit Prediction Scoring System) probability. Higher scores mean a greater likelihood of exploitation in the wild within the next 30 days.

164
EPSS > 50%
156
CISA KEV Listed
35,468
CVEs with EPSS
0.7%
Avg EPSS Score
All Critical High Medium Low
Rank CVE ID EPSS Score Percentile CVSS Flags Summary
6001 CVE-2026-25579
0.06%
17.2th 6.5 This vulnerability allows authenticated users to crash Navidrome servers by sending requests with ex
6002 CVE-2025-68699
0.06%
17.2th 6.5 CVE-2025-68699 is a NULL pointer dereference vulnerability in NanoMQ MQTT Broker that allows remote
6003 CVE-2026-24664
0.06%
17.2th 5.3 CVE-2026-24664 is a username enumeration vulnerability in Open eClass (formerly GUnet eClass) that a
6004 CVE-2025-15542
0.06%
17.1th 5.3 CVE-2025-15542 is a denial-of-service vulnerability in TP-Link VX800v v1.0 VoIP phones where imprope
6005 CVE-2025-6208
0.06%
17.2th 5.3 The SimpleDirectoryReader component in llama_index.core versions before 0.12.41 has a memory managem
6006 CVE-2024-48417
0.05%
16.9th 5.2 This vulnerability allows attackers to inject malicious scripts into the Edimax AC1200 router's web
6007 CVE-2025-24742
0.05%
16.6th 4.3 A Cross-Site Request Forgery (CSRF) vulnerability in WP Go Maps WordPress plugin allows attackers to
6008 CVE-2025-21640
0.05%
16.6th 5.5 This CVE describes a NULL pointer dereference vulnerability in the Linux kernel's SCTP subsystem. Wh
6009 CVE-2025-21638
0.05%
16.6th 5.5 A NULL pointer dereference vulnerability in the Linux kernel's SCTP implementation allows local atta
6010 CVE-2024-6352
0.05%
16.9th 4.3 A buffer overflow vulnerability in the APS layer of the Ember ZNet stack allows an attacker to cause
6011 CVE-2025-25471
0.05%
16.7th 4.3 This vulnerability is a NULL pointer dereference in FFmpeg's MOV file format parser that can cause a
6012 CVE-2024-20147
0.05%
16.6th 5.3 This CVE describes a Bluetooth firmware vulnerability in MediaTek chipsets where improper exception
6013 CVE-2025-0813
0.05%
16.8th 6.8 This CVE describes an authentication bypass vulnerability in Schneider Electric EPAS-UI software whe
6014 CVE-2025-28867
0.05%
16.6th 4.3 This CSRF vulnerability in the stesvis Frontpage category filter WordPress plugin allows attackers t
6015 CVE-2025-28864
0.05%
16.6th 4.3 A Cross-Site Request Forgery (CSRF) vulnerability in Planet Studio Builder for Contact Form 7 by Web
6016 CVE-2025-28862
0.05%
16.6th 4.3 A Cross-Site Request Forgery (CSRF) vulnerability in the WordPress Comment Date and Gravatar Remover
6017 CVE-2025-28859
0.05%
16.6th 4.3 This CSRF vulnerability in the WordPress Maintenance Notice plugin allows attackers to trick authent
6018 CVE-2025-28856
0.05%
16.6th 4.3 This CSRF vulnerability in the W3Counter WordPress plugin allows attackers to trick authenticated ad
6019 CVE-2024-52285
0.05%
16.7th 5.3 This vulnerability allows unauthenticated remote attackers to access sensitive data through exposed
6020 CVE-2025-43861
0.05%
16.7th 4.4 ManageWiki extension for MediaWiki has a cross-site scripting vulnerability where logged-in attacker
6021 CVE-2025-4633
0.05%
16.8th 6.5 CVE-2025-4633 allows unauthenticated attackers to access Airpointer 2.4.107-2 web portals using defa
6022 CVE-2025-5273
0.05%
16.7th 6.5 The mcp-markdownify-server package is vulnerable to arbitrary file read attacks through its get-mark
6023 CVE-2024-57336
0.05%
16.8th 6.5 This vulnerability allows unauthorized attackers to bypass access controls in M2Soft CROWNIX Report
6024 CVE-2025-25029
0.05%
16.9th 4.9 IBM Security Guardium 12.0 contains an improper input escaping vulnerability that allows authenticat
6025 CVE-2025-25025
0.05%
16.7th 4.3 IBM Security Guardium 12.0 discloses sensitive technical error information to remote attackers via b
6026 CVE-2025-5182
0.05%
16.6th 4.3 This vulnerability allows attackers to bypass authorization controls in the Summer Pearl Group Vacat
6027 CVE-2025-3885
0.05%
16.6th 6.5 This vulnerability allows attackers within Bluetooth range to crash Harman Becker MGU21 infotainment
6028 CVE-2025-2560
0.05%
16.8th 4.8 This vulnerability in the Ninja Forms WordPress plugin allows administrators to inject malicious scr
6029 CVE-2025-1289
0.05%
16.8th 4.8 This vulnerability allows WordPress administrators to inject malicious scripts into plugin settings,
6030 CVE-2025-0329
0.05%
16.8th 4.8 This vulnerability allows high-privilege WordPress users (like administrators) to inject malicious s
6031 CVE-2024-9390
0.05%
16.8th 4.8 This vulnerability allows high-privilege WordPress users (like administrators) to inject malicious s
6032 CVE-2024-9236
0.05%
16.8th 4.8 This vulnerability in the Team WordPress plugin allows administrators to inject malicious scripts in
6033 CVE-2024-9227
0.05%
16.8th 4.8 This vulnerability in the PowerPress Podcasting plugin allows authenticated admin users to inject ma
6034 CVE-2024-8759
0.05%
16.8th 4.8 The Nested Pages WordPress plugin before version 3.2.9 contains a stored cross-site scripting (XSS)
6035 CVE-2024-8620
0.05%
16.8th 4.8 The MapPress Maps for WordPress plugin before version 2.93 contains a stored cross-site scripting (X
6036 CVE-2024-8618
0.05%
16.8th 4.8 This vulnerability in the Page Builder: Pagelayer WordPress plugin allows administrators to inject m
6037 CVE-2024-7758
0.05%
16.8th 4.8 The Stylish Price List WordPress plugin before version 7.1.8 contains a stored cross-site scripting
6038 CVE-2024-6708
0.05%
16.8th 4.8 This vulnerability in the User Profile Builder WordPress plugin allows authenticated administrators
6039 CVE-2024-4665
0.05%
16.8th 6.4 The EventPrime WordPress plugin before version 3.5.0 has an authorization bypass vulnerability that
6040 CVE-2024-2869
0.05%
16.8th 4.8 This vulnerability in the Easy Property Listings WordPress plugin allows administrators to inject ma
6041 CVE-2024-13730
0.05%
16.8th 4.8 This vulnerability allows high-privilege WordPress users (like administrators) to inject malicious s
6042 CVE-2024-13486
0.05%
16.8th 4.8 The Icegram Engage WordPress plugin before version 3.1.32 contains a stored cross-site scripting (XS
6043 CVE-2024-13384
0.05%
16.8th 4.8 This vulnerability in the Rbs Image Gallery WordPress plugin allows administrators to inject malicio
6044 CVE-2024-13382
0.05%
16.8th 4.8 This vulnerability in the Calculated Fields Form WordPress plugin allows administrators to inject ma
6045 CVE-2024-13313
0.05%
16.8th 4.8 The AWeber WordPress plugin through version 7.3.20 contains a stored cross-site scripting (XSS) vuln
6046 CVE-2024-13127
0.05%
16.8th 4.8 This vulnerability in the LearnPress WordPress plugin allows administrators to inject malicious scri
6047 CVE-2024-12808
0.05%
16.8th 4.8 This vulnerability in the WP ERP WordPress plugin allows high-privilege users (like administrators)
6048 CVE-2024-12770
0.05%
16.8th 4.8 This vulnerability in the WP ULike WordPress plugin allows administrators to inject malicious script
6049 CVE-2024-12743
0.05%
16.8th 4.8 This vulnerability in the MailPoet WordPress plugin allows administrators to inject malicious script
6050 CVE-2024-12716
0.05%
16.8th 4.8 This vulnerability in the Simple Basic Contact Form WordPress plugin allows administrators to inject

What is EPSS?

The Exploit Prediction Scoring System (EPSS) is a data-driven model developed by FIRST.org that estimates the probability a CVE will be exploited in the wild within the next 30 days. Unlike CVSS which measures severity, EPSS measures likelihood of exploitation — making it ideal for prioritizing which vulnerabilities to patch first.

Why EPSS matters: With thousands of CVEs published monthly, not all vulnerabilities are equally dangerous. EPSS helps security teams focus on the CVEs most likely to be actively exploited, rather than patching solely by CVSS score. A critical CVSS 9.8 vulnerability with 0.1% EPSS may be less urgent than a high CVSS 7.5 with 90% EPSS.

Prioritize by Exploit Risk

Scan your servers and see which vulnerabilities have the highest EPSS scores. Focus on what attackers are actually targeting.

Start Monitoring Free