Most Exploitable CVEs - EPSS Rankings

CVEs ranked by EPSS (Exploit Prediction Scoring System) probability. Higher scores mean a greater likelihood of exploitation in the wild within the next 30 days.

164
EPSS > 50%
156
CISA KEV Listed
35,468
CVEs with EPSS
0.7%
Avg EPSS Score
All Critical High Medium Low
Rank CVE ID EPSS Score Percentile CVSS Flags Summary
6551 CVE-2025-7443
0.17%
38.2th 8.1 The BerqWP WordPress plugin has an unauthenticated arbitrary file upload vulnerability that allows a
6552 CVE-2025-56769
0.17%
38.3th 6.5 A vulnerability in chinabugotech hutool's QLExpressEngine class allows attackers to execute arbitrar
6553 CVE-2025-64363
0.17%
38.3th 7.5 This CVE describes a PHP Local File Inclusion vulnerability in the Kleo WordPress theme. Attackers c
6554 CVE-2025-64284
0.17%
38.3th 7.5 This CVE describes a PHP Local File Inclusion vulnerability in the Majestic Support WordPress plugin
6555 CVE-2025-64216
0.17%
38.3th 7.5 This vulnerability allows attackers to include local files on the server through improper filename c
6556 CVE-2025-64195
0.17%
38.3th 7.5 This CVE describes a PHP Local File Inclusion vulnerability in the Eduma WordPress theme by ThimPres
6557 CVE-2025-62054
0.17%
38.3th 7.5 This vulnerability allows remote attackers to include arbitrary files from external servers via PHP'
6558 CVE-2025-49552
0.17%
38.3th 7.3 Adobe Connect versions 12.9 and earlier contain a DOM-based XSS vulnerability that allows high-privi
6559 CVE-2025-9566
0.17%
38.3th 8.1 A path traversal vulnerability in Podman's kube play command allows attackers to overwrite arbitrary
6560 CVE-2025-60248
0.17%
38.3th 7.5 This vulnerability allows attackers to include local files on the server through improper filename c
6561 CVE-2025-60196
0.17%
38.3th 7.5 This vulnerability allows attackers to include local files on the server through PHP's include/requi
6562 CVE-2024-51317
0.17%
38.3th 6.5 A command injection vulnerability in NetSurf browser version 3.11 allows remote attackers to execute
6563 CVE-2021-47753
0.17%
38.3th 9.8 CVE-2021-47753 is an unauthenticated file upload vulnerability in phpKF CMS that allows remote attac
6564 CVE-2024-52969
0.17%
38.1th 4.1 This SQL injection vulnerability in FortiSIEM's Update/Create Case feature allows authenticated atta
6565 CVE-2025-22921
0.17%
38.1th 6.5 This vulnerability in FFmpeg's JPEG2000 decoder allows attackers to cause a segmentation fault (cras
6566 CVE-2025-26373
0.17%
38.2th 6.5 This vulnerability allows authenticated low-privileged attackers to enumerate user accounts in Q-Fre
6567 CVE-2023-38272
0.17%
38.1th 5.9 This vulnerability in IBM Cloud Pak System allows authenticated users with network access to view se
6568 CVE-2024-7957
0.17%
38.2th 9.1 This vulnerability allows attackers to overwrite or create arbitrary files on systems running danswe
6569 CVE-2024-7765
0.17%
38.1th 7.5 This vulnerability in h2oai/h2o-3 allows attackers to cause denial of service by uploading specially
6570 CVE-2025-4079
0.17%
38.1th 7.3 A critical buffer overflow vulnerability exists in PCMan FTP Server's RENAME command handler, allowi
6571 CVE-2025-3982
0.17%
38.1th 4.3 This CVE describes a prototype pollution vulnerability in Sverchok 1.3.0's Set Property Mk2 Node. At
6572 CVE-2024-11299
0.17%
38.1th 5.3 The Memberpress WordPress plugin exposes sensitive information through WordPress core search functio
6573 CVE-2025-22871
0.17%
38.2th 9.1 This vulnerability in Go's net/http package allows HTTP request smuggling when servers incorrectly a
6574 CVE-2025-41651
0.17%
38.1th 9.8 This critical vulnerability allows unauthenticated remote attackers to execute arbitrary commands on
6575 CVE-2025-45863
0.17%
38.1th 9.8 This vulnerability allows remote attackers to execute arbitrary code on TOTOLINK A3002R routers via
6576 CVE-2025-45861
0.17%
38.1th 9.8 This CVE describes a critical buffer overflow vulnerability in TOTOLINK A3002R routers that allows r
6577 CVE-2025-31204
0.17%
38.2th 8.8 This is a memory corruption vulnerability in Apple's WebKit browser engine affecting multiple Apple
6578 CVE-2025-28062
0.17%
38.1th 8.1 A Cross-Site Request Forgery vulnerability in ERPNEXT allows attackers to trick authenticated users
6579 CVE-2025-32896
0.17%
38.1th 6.5 Unauthorized attackers can exploit Apache SeaTunnel's REST API to read arbitrary files and perform d
6580 CVE-2025-53888
0.17%
38.2th 9.8 RIOT-OS versions up to 2025.04 have a buffer overflow vulnerability in the l2filter_add() function w
6581 CVE-2025-5314
0.17%
38.1th 6.1 This vulnerability allows unauthenticated attackers to inject malicious JavaScript via the 'pdf-sour
6582 CVE-2025-61788
0.17%
38.2th 5.4 Opencast versions before 17.8 and 18.2 have a stored cross-site scripting (XSS) vulnerability where
6583 CVE-2025-13525
0.17%
38.2th 6.1 The WP Directory Kit WordPress plugin has a reflected cross-site scripting (XSS) vulnerability in th
6584 CVE-2025-62053
0.17%
38.2th 8.0 This CVE describes a PHP remote file inclusion vulnerability in the Houzez WordPress theme. Attacker
6585 CVE-2026-2096
0.17%
38.1th 9.8 Agentflow software by Flowring has a Missing Authentication vulnerability (CWE-288) that allows unau
6586 CVE-2025-64407
0.17%
38.2th 5.3 Apache OpenOffice versions through 4.1.15 have an authorization vulnerability where specially crafte
6587 CVE-2025-12531
0.17%
38.1th 7.1 IBM InfoSphere Information Server versions 11.7.0.0 through 11.7.1.6 contain an XML external entity
6588 CVE-2025-67897
0.17%
38.1th 5.3 This vulnerability in Sequoia PGP library versions before 2.1.0 allows remote attackers to crash app
6589 CVE-2026-21643
0.17%
38.1th 9.8 An unauthenticated SQL injection vulnerability in Fortinet FortiClientEMS allows attackers to execut
6590 CVE-2025-21403
0.17%
37.9th 6.4 This vulnerability in On-Premises Data Gateway allows unauthorized access to sensitive information s
6591 CVE-2025-1681
0.17%
38th 5.4 The Cardealer WordPress theme has a vulnerability that allows authenticated users with subscriber-le
6592 CVE-2025-0592
0.17%
38th 8.8 This vulnerability allows remote attackers with low privileges to execute arbitrary shell commands b
6593 CVE-2025-31529
0.17%
37.9th 4.3 A missing authorization vulnerability in the Slider Path for Elementor WordPress plugin allows attac
6594 CVE-2025-31417
0.17%
37.9th 4.3 This CVE describes a Missing Authorization vulnerability in the WP Docs WordPress plugin that allows
6595 CVE-2025-30909
0.17%
37.9th 4.3 This CVE describes a missing authorization vulnerability in the Conversios.io WordPress plugin that
6596 CVE-2025-30851
0.17%
37.9th 4.3 This CVE describes a missing authorization vulnerability in the Tickera WordPress plugin that allows
6597 CVE-2025-2757
0.17%
38th 6.3 A critical heap-based buffer overflow vulnerability in Assimp's MD5 file parser allows remote attack
6598 CVE-2025-2754
0.17%
38th 6.3 A critical heap-based buffer overflow vulnerability in Assimp's AC3D file handler allows remote atta
6599 CVE-2025-30346
0.17%
38th 5.4 This vulnerability allows attackers to perform client-side desync attacks via HTTP/1 requests agains
6600 CVE-2024-7053
0.17%
38th 9.0 This vulnerability allows an attacker with a user-level account to perform a session fixation attack

What is EPSS?

The Exploit Prediction Scoring System (EPSS) is a data-driven model developed by FIRST.org that estimates the probability a CVE will be exploited in the wild within the next 30 days. Unlike CVSS which measures severity, EPSS measures likelihood of exploitation — making it ideal for prioritizing which vulnerabilities to patch first.

Why EPSS matters: With thousands of CVEs published monthly, not all vulnerabilities are equally dangerous. EPSS helps security teams focus on the CVEs most likely to be actively exploited, rather than patching solely by CVSS score. A critical CVSS 9.8 vulnerability with 0.1% EPSS may be less urgent than a high CVSS 7.5 with 90% EPSS.

Prioritize by Exploit Risk

Scan your servers and see which vulnerabilities have the highest EPSS scores. Focus on what attackers are actually targeting.

Start Monitoring Free