Most Exploitable CVEs - EPSS Rankings

CVEs ranked by EPSS (Exploit Prediction Scoring System) probability. Higher scores mean a greater likelihood of exploitation in the wild within the next 30 days.

164
EPSS > 50%
156
CISA KEV Listed
35,468
CVEs with EPSS
0.7%
Avg EPSS Score
All Critical High Medium Low
Rank CVE ID EPSS Score Percentile CVSS Flags Summary
6151 CVE-2025-57772
0.18%
39.9th 9.8 This vulnerability allows remote code execution in DataEase BI tools through a JDBC URL bypass. Atta
6152 CVE-2025-54813
0.18%
39.9th 7.5 This vulnerability in Apache Log4cxx's JSONLayout allows attackers to inject non-printable character
6153 CVE-2025-11254
0.18%
39.9th 4.3 This CSV injection vulnerability in the Contest Gallery WordPress plugin allows unauthenticated atta
6154 CVE-2025-48633
0.18%
39.9th 5.5 KEV This vulnerability in Android's DevicePolicyManagerService allows an attacker to add a Device Owner
6155 CVE-2025-14206
0.18%
40th 6.5 This vulnerability in SourceCodester Online Student Clearance System 1.0 allows attackers to bypass
6156 CVE-2025-65806
0.18%
40th 4.3 This vulnerability in E-POINT CMS allows attackers to upload nested ZIP archives containing executab
6157 CVE-2025-13374
0.18%
39.9th 9.8 The Kalrav AI Agent WordPress plugin allows unauthenticated attackers to upload arbitrary files due
6158 CVE-2025-24017
0.18%
39.9th 7.6 YesWiki versions up to 4.4.5 contain a DOM-based cross-site scripting (XSS) vulnerability in the tag
6159 CVE-2025-23208
0.18%
39.8th 7.3 CVE-2025-23208 is an authorization bypass vulnerability in Zot OCI image registry where group member
6160 CVE-2024-12614
0.18%
39.8th 7.5 The Passwords Manager WordPress plugin up to version 1.4.8 lacks proper authorization checks, allowi
6161 CVE-2025-22495
0.18%
39.9th 8.4 An improper input validation vulnerability in the NTP server configuration field of Eaton Network-M2
6162 CVE-2024-56000
0.18%
39.8th 9.8 CVE-2024-56000 is an incorrect privilege assignment vulnerability in SeventhQueen's K Elements WordP
6163 CVE-2024-52612
0.18%
39.8th 6.8 SolarWinds Platform contains a reflected cross-site scripting vulnerability that allows authenticate
6164 CVE-2024-13643
0.18%
39.8th 8.8 The Zox News WordPress theme has a vulnerability that allows authenticated users with Subscriber-lev
6165 CVE-2025-24278
0.18%
39.8th 5.5 A symlink validation vulnerability in macOS allows applications to bypass file system protections an
6166 CVE-2025-31679
0.18%
39.9th 6.1 This Cross-Site Scripting (XSS) vulnerability in Drupal's Ignition Error Pages module allows attacke
6167 CVE-2025-27015
0.18%
39.9th 7.5 This vulnerability allows attackers to include local files on the server through improper filename c
6168 CVE-2024-8501
0.18%
39.8th 8.8 This vulnerability allows any user to download arbitrary files from the rpc_agent's host system by e
6169 CVE-2025-25589
0.18%
39.8th 8.1 This XXE injection vulnerability in yimioa's XML parsing component allows attackers to execute arbit
6170 CVE-2025-26696
0.18%
39.9th 7.0 This vulnerability in Thunderbird email client incorrectly displays signed OpenPGP messages as encry
6171 CVE-2025-32379
0.18%
39.9th 5.0 This vulnerability in Koa.js allows cross-site scripting (XSS) attacks when untrusted user input is
6172 CVE-2025-30303
0.18%
39.8th 5.5 Adobe Framemaker versions 2020.8, 2022.6 and earlier contain an out-of-bounds read vulnerability tha
6173 CVE-2025-27202
0.18%
39.8th 5.5 Adobe Animate versions 24.0.7, 23.0.10 and earlier contain an out-of-bounds read vulnerability that
6174 CVE-2025-27186
0.18%
39.8th 5.5 Adobe After Effects versions 25.1, 24.6.4 and earlier contain an out-of-bounds read vulnerability th
6175 CVE-2025-27184
0.18%
39.8th 5.5 CVE-2025-27184 is an out-of-bounds read vulnerability in Adobe After Effects that could allow an att
6176 CVE-2025-5720
0.18%
39.9th 6.4 This vulnerability allows unauthenticated attackers to inject malicious scripts into WordPress websi
6177 CVE-2025-12907
0.18%
39.8th 8.8 This vulnerability allows remote attackers to execute arbitrary code on affected Chrome browsers thr
6178 CVE-2025-12197
0.18%
39.8th 7.5 The Events Calendar WordPress plugin versions 6.15.1.1 through 6.15.9 contain a blind SQL injection
6179 CVE-2025-48631
0.18%
39.8th 6.5 This vulnerability in Android's LocalImageResolver component allows remote attackers to cause persis
6180 CVE-2025-13801
0.18%
39.8th 7.5 The Yoco Payments WordPress plugin contains a path traversal vulnerability that allows unauthenticat
6181 CVE-2025-68620
0.18%
39.8th 9.1 Signal K Server versions before 2.19.0 allow unauthenticated attackers to steal JWT authentication t
6182 CVE-2026-25069
0.18%
39.8th N/A SunFounder Pironman Dashboard versions 1.3.13 and earlier contain an unauthenticated path traversal
6183 CVE-2024-7577
0.18%
39.6th 4.4 IBM InfoSphere Information Server 11.7 may expose sensitive user credentials in log files during new
6184 CVE-2024-55029
0.18%
39.7th 6.1 NASA Fprime v3.4.3 contains multiple cross-site scripting (XSS) vulnerabilities that allow attackers
6185 CVE-2025-2744
0.18%
39.6th 5.4 This critical vulnerability in ruoyi-vue-pro 2.4.1 allows attackers to perform path traversal attack
6186 CVE-2025-25871
0.18%
39.6th 8.0 A privilege escalation vulnerability in Open Panel v0.3.4 allows remote attackers to gain elevated p
6187 CVE-2024-13895
0.18%
39.7th 4.3 The Code Snippets CPT WordPress plugin allows authenticated attackers with Subscriber-level access o
6188 CVE-2020-36844
0.18%
39.7th 6.1 This vulnerability allows reflected cross-site scripting (XSS) attacks in KnowBe4 Security Awareness
6189 CVE-2025-29015
0.18%
39.7th 6.1 Code Astro Internet Banking System 2.0.0 contains a stored cross-site scripting vulnerability in the
6190 CVE-2025-29710
0.18%
39.7th 6.1 SourceCodester Company Website CMS 1.0 contains a stored cross-site scripting (XSS) vulnerability in
6191 CVE-2025-32230
0.18%
39.7th 4.3 This vulnerability allows attackers to inject malicious HTML/JavaScript into Tutor LMS web pages thr
6192 CVE-2025-3245
0.18%
39.7th 6.3 This critical SQL injection vulnerability in itsourcecode Library Management System 1.0 allows attac
6193 CVE-2025-30354
0.18%
39.7th 4.3 A sandbox bypass vulnerability in Bruno IDE allows malicious API collection files to execute arbitra
6194 CVE-2025-8578
0.18%
39.7th 8.8 This use-after-free vulnerability in Chrome's Cast component allows attackers to potentially exploit
6195 CVE-2025-11120
0.18%
39.7th 8.8 A buffer overflow vulnerability in Tenda AC8 routers allows remote attackers to execute arbitrary co
6196 CVE-2025-10358
0.18%
39.6th 7.3 This CVE describes a remote command injection vulnerability in Wavlink WL-WN578W2 routers. Attackers
6197 CVE-2025-11339
0.18%
39.7th 8.8 A buffer overflow vulnerability in D-Link DI-7100G C1 routers allows remote attackers to execute arb
6198 CVE-2025-20354
0.18%
39.6th 9.8 This critical vulnerability in Cisco Unified CCX allows unauthenticated remote attackers to upload a
6199 CVE-2021-47752
0.18%
39.6th 7.5 CVE-2021-47752 is a denial of service vulnerability in AWebServer GhostBuilding 18 that allows remot
6200 CVE-2025-24169
0.18%
39.5th 7.5 This vulnerability allows malicious applications to bypass browser extension authentication in Safar

What is EPSS?

The Exploit Prediction Scoring System (EPSS) is a data-driven model developed by FIRST.org that estimates the probability a CVE will be exploited in the wild within the next 30 days. Unlike CVSS which measures severity, EPSS measures likelihood of exploitation — making it ideal for prioritizing which vulnerabilities to patch first.

Why EPSS matters: With thousands of CVEs published monthly, not all vulnerabilities are equally dangerous. EPSS helps security teams focus on the CVEs most likely to be actively exploited, rather than patching solely by CVSS score. A critical CVSS 9.8 vulnerability with 0.1% EPSS may be less urgent than a high CVSS 7.5 with 90% EPSS.

Prioritize by Exploit Risk

Scan your servers and see which vulnerabilities have the highest EPSS scores. Focus on what attackers are actually targeting.

Start Monitoring Free