Most Exploitable CVEs - EPSS Rankings

CVEs ranked by EPSS (Exploit Prediction Scoring System) probability. Higher scores mean a greater likelihood of exploitation in the wild within the next 30 days.

164
EPSS > 50%
156
CISA KEV Listed
35,468
CVEs with EPSS
0.7%
Avg EPSS Score
All Critical High Medium Low
Rank CVE ID EPSS Score Percentile CVSS Flags Summary
6101 CVE-2025-30794
0.19%
40.2th 7.1 This reflected cross-site scripting (XSS) vulnerability in The Events Calendar Event Tickets WordPre
6102 CVE-2025-30614
0.19%
40.2th 7.1 This vulnerability allows attackers to inject malicious scripts into web pages generated by the Goog
6103 CVE-2025-30607
0.19%
40.2th 7.1 This vulnerability allows attackers to inject malicious scripts into web pages generated by the Quic
6104 CVE-2025-30579
0.19%
40.2th 7.1 This vulnerability allows attackers to inject malicious scripts into web pages viewed by other users
6105 CVE-2025-30559
0.19%
40.2th 7.1 This stored cross-site scripting (XSS) vulnerability in the Kento WordPress Stats plugin allows atta
6106 CVE-2025-30547
0.19%
40.2th 7.1 This vulnerability allows attackers to inject malicious scripts into web pages generated by the WP C
6107 CVE-2025-30520
0.19%
40.2th 7.1 A reflected cross-site scripting (XSS) vulnerability in the Breezing Forms WordPress plugin allows a
6108 CVE-2025-5280
0.19%
40.1th 8.8 This vulnerability allows remote attackers to execute arbitrary code or cause denial of service thro
6109 CVE-2025-51401
0.19%
40.1th 5.4 A stored cross-site scripting (XSS) vulnerability in Live Helper Chat v4.60 allows attackers to inje
6110 CVE-2025-51398
0.19%
40.1th 5.4 A stored cross-site scripting (XSS) vulnerability in Live Helper Chat v4.60 allows attackers to inje
6111 CVE-2025-51396
0.19%
40.1th 5.4 A stored cross-site scripting (XSS) vulnerability in Live Helper Chat v4.60 allows attackers to inje
6112 CVE-2025-8760
0.19%
40.3th 9.8 A buffer overflow vulnerability in INSTAR IP camera firmware allows remote attackers to execute arbi
6113 CVE-2025-10172
0.19%
40.1th 8.8 A buffer overflow vulnerability in UTT 750W devices up to version 3.2.2-191225 allows remote attacke
6114 CVE-2025-10171
0.19%
40.1th 8.8 A buffer overflow vulnerability in UTT 1250GW devices allows remote attackers to execute arbitrary c
6115 CVE-2025-10170
0.19%
40.1th 8.8 A buffer overflow vulnerability in UTT 1200GW devices allows remote attackers to execute arbitrary c
6116 CVE-2025-54104
0.19%
40.1th 6.7 A type confusion vulnerability in Windows Defender Firewall Service allows authenticated attackers t
6117 CVE-2025-53810
0.19%
40.1th 6.7 This CVE describes a type confusion vulnerability in the Windows Defender Firewall Service that allo
6118 CVE-2026-25894
0.19%
40.1th 9.8 An insecure default configuration in FUXA web-based SCADA/HMI software allows unauthenticated remote
6119 CVE-2025-65792
0.19%
40.1th 9.1 DataGear v5.5.0 contains a path traversal vulnerability (CWE-22) that allows attackers to delete arb
6120 CVE-2026-25858
0.19%
40.1th 9.8 This vulnerability allows unauthenticated attackers to reset passwords for any user account by explo
6121 CVE-2025-65882
0.19%
40.1th 9.8 This vulnerability in openmptcprouter allows attackers to write arbitrary files or execute arbitrary
6122 CVE-2024-49354
0.18%
40th 5.3 IBM Concert versions 1.0.0 through 1.0.2 contain an API vulnerability that allows attackers to extra
6123 CVE-2024-56828
0.18%
40th 9.8 This CVE describes a file upload vulnerability in ChestnutCMS that allows attackers to upload arbitr
6124 CVE-2025-0225
0.18%
40.1th 4.3 This path traversal vulnerability in Tsinghua Unigroup Electronic Archives System allows attackers t
6125 CVE-2025-26200
0.18%
40th 7.2 This SQL injection vulnerability in SLIMS v9.6.1 allows remote attackers to execute arbitrary SQL co
6126 CVE-2024-12511
0.18%
40th 7.6 This vulnerability allows attackers with address book access to modify SMB/FTP settings on affected
6127 CVE-2024-9230
0.18%
40th 5.9 The PowerPress Podcasting plugin for WordPress before version 11.9.18 has a stored cross-site script
6128 CVE-2025-5934
0.18%
40th 8.8 A critical stack-based buffer overflow vulnerability in Netgear EX3700 devices allows remote attacke
6129 CVE-2025-6994
0.18%
40th 9.8 The Reveal Listing WordPress plugin allows unauthenticated attackers to register accounts with admin
6130 CVE-2025-5954
0.18%
40th 9.8 The Service Finder SMS System WordPress plugin allows unauthenticated attackers to register administ
6131 CVE-2025-58745
0.18%
40.1th 9.9 This vulnerability allows attackers to bypass MIME type validation and upload malicious PHP files di
6132 CVE-2025-36894
0.18%
40th 7.5 This vulnerability allows remote attackers to cause a denial of service (DoS) in affected systems wi
6133 CVE-2025-49553
0.18%
40.1th 9.3 Adobe Connect versions 12.9 and earlier contain a DOM-based Cross-Site Scripting vulnerability that
6134 CVE-2025-54265
0.18%
40th 5.9 Adobe Commerce (Magento) versions 2.4.9-alpha2 through 2.4.4-p15 and earlier contain an incorrect au
6135 CVE-2025-65493
0.18%
40th 7.5 A NULL pointer dereference vulnerability in OISM libcoap 4.3.5 allows remote attackers to cause deni
6136 CVE-2025-12528
0.18%
40th 8.1 The Pie Forms for WP WordPress plugin has an arbitrary file upload vulnerability that allows unauthe
6137 CVE-2025-14038
0.18%
40th 7.0 EDB Hybrid Manager contains an authentication bypass vulnerability in gRPC endpoints due to Istio Ga
6138 CVE-2025-67721
0.18%
40th N/A CVE-2025-67721 is a memory disclosure vulnerability in Aircompressor Java library where malformed Sn
6139 CVE-2025-9611
0.18%
40th N/A Microsoft Playwright MCP Server versions before 0.0.40 lack Origin header validation, enabling DNS r
6140 CVE-2025-21268
0.18%
40th 4.3 This vulnerability allows attackers to bypass the MapUrlToZone security feature in Microsoft Windows
6141 CVE-2024-53931
0.18%
39.9th 9.1 This vulnerability allows any Android application without permissions to place phone calls without u
6142 CVE-2024-46622
0.18%
39.9th 9.8 This CVE describes an escalation of privilege vulnerability in SecureAge Security Suite that allows
6143 CVE-2025-1641
0.18%
40th 7.3 This critical SQL injection vulnerability in Benner ModernaNet allows remote attackers to execute ar
6144 CVE-2025-1640
0.18%
40th 7.3 This critical SQL injection vulnerability in Benner ModernaNet allows attackers to execute arbitrary
6145 CVE-2024-12629
0.18%
40th 4.1 This CVE describes a prototype pollution vulnerability in Progress Telerik KendoReact components whe
6146 CVE-2025-3001
0.18%
39.9th 5.3 A critical memory corruption vulnerability in PyTorch's torch.lstm_cell function allows local attack
6147 CVE-2025-32795
0.18%
40th 6.5 This CVE describes an improper access control vulnerability in Dify, an open-source LLM app developm
6148 CVE-2025-27571
0.18%
40th 4.3 This vulnerability allows authenticated users to view metadata from archived channels even when the
6149 CVE-2025-32111
0.18%
39.9th 8.7 This CVE describes a GitHub Actions workflow vulnerability in acme.sh Docker images where the checko
6150 CVE-2025-48069
0.18%
39.9th 6.6 CVE-2025-48069 is a command injection vulnerability in ejson2env versions before 2.0.8 where insuffi

What is EPSS?

The Exploit Prediction Scoring System (EPSS) is a data-driven model developed by FIRST.org that estimates the probability a CVE will be exploited in the wild within the next 30 days. Unlike CVSS which measures severity, EPSS measures likelihood of exploitation — making it ideal for prioritizing which vulnerabilities to patch first.

Why EPSS matters: With thousands of CVEs published monthly, not all vulnerabilities are equally dangerous. EPSS helps security teams focus on the CVEs most likely to be actively exploited, rather than patching solely by CVSS score. A critical CVSS 9.8 vulnerability with 0.1% EPSS may be less urgent than a high CVSS 7.5 with 90% EPSS.

Prioritize by Exploit Risk

Scan your servers and see which vulnerabilities have the highest EPSS scores. Focus on what attackers are actually targeting.

Start Monitoring Free