Most Exploitable CVEs - EPSS Rankings

CVEs ranked by EPSS (Exploit Prediction Scoring System) probability. Higher scores mean a greater likelihood of exploitation in the wild within the next 30 days.

164
EPSS > 50%
156
CISA KEV Listed
35,468
CVEs with EPSS
0.7%
Avg EPSS Score
All Critical High Medium Low
Rank CVE ID EPSS Score Percentile CVSS Flags Summary
6101 CVE-2025-65020
0.05%
16.7th 6.5 An Insecure Direct Object Reference (IDOR) vulnerability in Rallly's poll duplication endpoint allow
6102 CVE-2025-13287
0.05%
16.8th 6.3 CVE-2025-13287 is a SQL injection vulnerability in itsourcecode Online Voting System 1.0 that allows
6103 CVE-2025-13279
0.05%
16.8th 6.3 CVE-2025-13279 is an SQL injection vulnerability in Nero Social Networking Site 1.0 that allows remo
6104 CVE-2025-13185
0.05%
16.8th 4.7 This vulnerability allows remote attackers to upload arbitrary files to the Bdtask/CodeCanyon News36
6105 CVE-2025-20346
0.05%
16.6th 4.3 This vulnerability in Cisco Catalyst Center allows authenticated users with read-only (Observer) pri
6106 CVE-2025-11820
0.05%
16.7th 6.4 The Graphina WordPress plugin has a stored XSS vulnerability that allows authenticated attackers wit
6107 CVE-2025-43385
0.05%
16.7th 4.3 This CVE describes an out-of-bounds memory access vulnerability in Apple's media file processing com
6108 CVE-2025-43384
0.05%
16.7th 4.3 This CVE describes an out-of-bounds memory access vulnerability in Apple's media file processing. At
6109 CVE-2025-43383
0.05%
16.7th 4.3 This CVE describes an out-of-bounds memory access vulnerability in Apple's media file processing. At
6110 CVE-2025-15393
0.05%
16.9th 6.3 This vulnerability allows remote attackers to execute arbitrary code on Kohana KodiCMS systems throu
6111 CVE-2025-14280
0.05%
16.8th 5.3 The PixelYourSite WordPress plugin exposes sensitive information through publicly accessible log fil
6112 CVE-2025-60458
0.05%
16.6th 6.5 UxPlay 1.72 contains a double free vulnerability in RTSP request handling. Attackers can send specia
6113 CVE-2025-1721
0.05%
16.8th 5.9 IBM Concert versions 1.0.0 through 2.1.0 contain a heap memory clearing vulnerability that could all
6114 CVE-2024-40317
0.05%
16.7th 6.1 This reflected cross-site scripting (XSS) vulnerability in MyNET allows attackers to inject maliciou
6115 CVE-2023-53961
0.05%
16.9th 4.3 This cross-site request forgery (CSRF) vulnerability in SOUND4 radio processing software allows atta
6116 CVE-2025-65790
0.05%
16.7th 6.1 A reflected cross-site scripting vulnerability in FuguHub 8.1 allows attackers to execute arbitrary
6117 CVE-2025-14442
0.05%
16.8th 5.3 The Secure Copy Content Protection and Content Locking WordPress plugin stores exported CSV files in
6118 CVE-2025-13211
0.05%
16.6th 5.3 This vulnerability in IBM Aspera Orchestrator allows authenticated users to cause denial of service
6119 CVE-2025-67716
0.05%
16.6th 5.7 The Auth0 Next.js SDK versions 4.9.0 through 4.12.1 have an input validation flaw in the returnTo pa
6120 CVE-2022-47425
0.05%
16.9th 4.3 This CVE describes a missing authorization vulnerability in the ARMember WordPress plugin that allow
6121 CVE-2025-13642
0.05%
16.7th 5.4 This vulnerability allows authenticated WordPress users with Subscriber-level access or higher to ex
6122 CVE-2025-59391
0.05%
16.8th 6.5 A memory disclosure vulnerability in libcoap's OSCORE configuration parser allows attackers to read
6123 CVE-2025-14214
0.05%
16.8th 6.3 This vulnerability allows remote attackers to execute arbitrary SQL commands via the ID parameter in
6124 CVE-2025-14008
0.05%
16.8th 4.7 This CVE describes a Server-Side Request Forgery (SSRF) vulnerability in dayrui XunRuiCMS up to vers
6125 CVE-2025-58113
0.05%
16.7th 6.5 An out-of-bounds read vulnerability in PDF-XChange Editor's EMF functionality allows attackers to re
6126 CVE-2025-13796
0.05%
16.7th 6.3 This Server-Side Request Forgery (SSRF) vulnerability in deco-cx apps allows attackers to manipulate
6127 CVE-2025-15491
0.05%
16.7th 5.5 The Post Slides WordPress plugin through version 1.0.1 contains a Local File Inclusion (LFI) vulnera
6128 CVE-2023-37525
0.05%
16.8th 5.3 This vulnerability in HCL BigFix Compliance allows remote attackers to access sensitive files in the
6129 CVE-2026-23961
0.05%
16.7th 5.3 This CVE describes a logic error in Mastodon's user suspension feature that allows posts from suspen
6130 CVE-2025-15104
0.05%
16.7th 5.3 The Nu Html Checker (validator.nu) contains a server-side request forgery (SSRF) vulnerability that
6131 CVE-2025-15526
0.05%
16.7th 5.3 The Fancy Product Designer WordPress plugin up to version 6.4.8 exposes server filesystem paths and
6132 CVE-2026-22918
0.05%
16.8th 4.3 This CVE describes a clickjacking vulnerability where attackers can trick users into performing unin
6133 CVE-2026-20935
0.05%
16.9th 6.2 This vulnerability allows an unauthorized local attacker to read sensitive information from Windows
6134 CVE-2026-20851
0.05%
16.9th 6.2 This vulnerability allows an unauthorized local attacker to read memory outside the intended buffer
6135 CVE-2026-20824
0.05%
16.6th 5.5 This vulnerability allows an unauthorized attacker to bypass a local security feature in Windows Rem
6136 CVE-2026-22773
0.05%
16.7th 6.5 This vulnerability allows remote attackers to crash vLLM servers running multimodal models with Idef
6137 CVE-2026-21874
0.05%
16.8th 5.3 This vulnerability allows unauthenticated attackers to exhaust Redis connections by repeatedly openi
6138 CVE-2025-14984
0.05%
16.7th 6.4 The Gutenverse Form WordPress plugin allows authenticated attackers with Author-level access or high
6139 CVE-2025-12648
0.05%
16.8th 5.3 The WP-Members WordPress plugin stores user-uploaded files in predictable directories without proper
6140 CVE-2025-15312
0.05%
16.9th 6.6 An improper output sanitization vulnerability in Tanium Appliance could allow attackers to inject ma
6141 CVE-2025-20908
0.05%
16.7th 6.5 This vulnerability in Samsung's Auracast feature allows nearby attackers to access Auracast broadcas
6142 CVE-2025-52871
0.05%
16.7th 6.5 An out-of-bounds read vulnerability in QNAP License Center allows authenticated remote attackers to
6143 CVE-2026-25518
0.05%
16.7th 5.9 This vulnerability in cert-manager allows attackers to cause denial-of-service by poisoning DNS cach
6144 CVE-2024-10705
0.05%
16.3th 5.4 The Multiple Page Generator Plugin (MPG) for WordPress versions up to 4.0.5 contains a Server-Side R
6145 CVE-2024-55928
0.05%
16.2th 6.5 Xerox Workplace Suite stores sensitive secrets like passwords and API keys in unencrypted plain text
6146 CVE-2024-45102
0.05%
16.4th 6.8 This privilege escalation vulnerability allows authenticated Lenovo XClarity Administrator (LXCA) us
6147 CVE-2024-56438
0.05%
16.3th 6.0 This vulnerability in Huawei's HUKS (Hardware Unified Key Store) module allows improper memory addre
6148 CVE-2024-20145
0.05%
16.4th 6.6 This vulnerability in V6 DA allows local privilege escalation through an out-of-bounds write due to
6149 CVE-2024-20143
0.05%
16.4th 6.6 This CVE describes an out-of-bounds write vulnerability in V6 DA (likely a MediaTek component) that
6150 CVE-2025-21823
0.05%
16.4th 5.5 A race condition vulnerability in the Linux kernel's batman-adv module could lead to memory corrupti

What is EPSS?

The Exploit Prediction Scoring System (EPSS) is a data-driven model developed by FIRST.org that estimates the probability a CVE will be exploited in the wild within the next 30 days. Unlike CVSS which measures severity, EPSS measures likelihood of exploitation — making it ideal for prioritizing which vulnerabilities to patch first.

Why EPSS matters: With thousands of CVEs published monthly, not all vulnerabilities are equally dangerous. EPSS helps security teams focus on the CVEs most likely to be actively exploited, rather than patching solely by CVSS score. A critical CVSS 9.8 vulnerability with 0.1% EPSS may be less urgent than a high CVSS 7.5 with 90% EPSS.

Prioritize by Exploit Risk

Scan your servers and see which vulnerabilities have the highest EPSS scores. Focus on what attackers are actually targeting.

Start Monitoring Free