Most Exploitable CVEs - EPSS Rankings
CVEs ranked by EPSS (Exploit Prediction Scoring System) probability. Higher scores mean a greater likelihood of exploitation in the wild within the next 30 days.
| Rank | CVE ID | EPSS Score | Percentile | CVSS | Flags | Summary |
|---|---|---|---|---|---|---|
| 6551 | CVE-2025-7443 |
|
38.2th | 8.1 | The BerqWP WordPress plugin has an unauthenticated arbitrary file upload vulnerability that allows a | |
| 6552 | CVE-2025-56769 |
|
38.3th | 6.5 | A vulnerability in chinabugotech hutool's QLExpressEngine class allows attackers to execute arbitrar | |
| 6553 | CVE-2025-64363 |
|
38.3th | 7.5 | This CVE describes a PHP Local File Inclusion vulnerability in the Kleo WordPress theme. Attackers c | |
| 6554 | CVE-2025-64284 |
|
38.3th | 7.5 | This CVE describes a PHP Local File Inclusion vulnerability in the Majestic Support WordPress plugin | |
| 6555 | CVE-2025-64216 |
|
38.3th | 7.5 | This vulnerability allows attackers to include local files on the server through improper filename c | |
| 6556 | CVE-2025-64195 |
|
38.3th | 7.5 | This CVE describes a PHP Local File Inclusion vulnerability in the Eduma WordPress theme by ThimPres | |
| 6557 | CVE-2025-62054 |
|
38.3th | 7.5 | This vulnerability allows remote attackers to include arbitrary files from external servers via PHP' | |
| 6558 | CVE-2025-49552 |
|
38.3th | 7.3 | Adobe Connect versions 12.9 and earlier contain a DOM-based XSS vulnerability that allows high-privi | |
| 6559 | CVE-2025-9566 |
|
38.3th | 8.1 | A path traversal vulnerability in Podman's kube play command allows attackers to overwrite arbitrary | |
| 6560 | CVE-2025-60248 |
|
38.3th | 7.5 | This vulnerability allows attackers to include local files on the server through improper filename c | |
| 6561 | CVE-2025-60196 |
|
38.3th | 7.5 | This vulnerability allows attackers to include local files on the server through PHP's include/requi | |
| 6562 | CVE-2024-51317 |
|
38.3th | 6.5 | A command injection vulnerability in NetSurf browser version 3.11 allows remote attackers to execute | |
| 6563 | CVE-2021-47753 |
|
38.3th | 9.8 | CVE-2021-47753 is an unauthenticated file upload vulnerability in phpKF CMS that allows remote attac | |
| 6564 | CVE-2024-52969 |
|
38.1th | 4.1 | This SQL injection vulnerability in FortiSIEM's Update/Create Case feature allows authenticated atta | |
| 6565 | CVE-2025-22921 |
|
38.1th | 6.5 | This vulnerability in FFmpeg's JPEG2000 decoder allows attackers to cause a segmentation fault (cras | |
| 6566 | CVE-2025-26373 |
|
38.2th | 6.5 | This vulnerability allows authenticated low-privileged attackers to enumerate user accounts in Q-Fre | |
| 6567 | CVE-2023-38272 |
|
38.1th | 5.9 | This vulnerability in IBM Cloud Pak System allows authenticated users with network access to view se | |
| 6568 | CVE-2024-7957 |
|
38.2th | 9.1 | This vulnerability allows attackers to overwrite or create arbitrary files on systems running danswe | |
| 6569 | CVE-2024-7765 |
|
38.1th | 7.5 | This vulnerability in h2oai/h2o-3 allows attackers to cause denial of service by uploading specially | |
| 6570 | CVE-2025-4079 |
|
38.1th | 7.3 | A critical buffer overflow vulnerability exists in PCMan FTP Server's RENAME command handler, allowi | |
| 6571 | CVE-2025-3982 |
|
38.1th | 4.3 | This CVE describes a prototype pollution vulnerability in Sverchok 1.3.0's Set Property Mk2 Node. At | |
| 6572 | CVE-2024-11299 |
|
38.1th | 5.3 | The Memberpress WordPress plugin exposes sensitive information through WordPress core search functio | |
| 6573 | CVE-2025-22871 |
|
38.2th | 9.1 | This vulnerability in Go's net/http package allows HTTP request smuggling when servers incorrectly a | |
| 6574 | CVE-2025-41651 |
|
38.1th | 9.8 | This critical vulnerability allows unauthenticated remote attackers to execute arbitrary commands on | |
| 6575 | CVE-2025-45863 |
|
38.1th | 9.8 | This vulnerability allows remote attackers to execute arbitrary code on TOTOLINK A3002R routers via | |
| 6576 | CVE-2025-45861 |
|
38.1th | 9.8 | This CVE describes a critical buffer overflow vulnerability in TOTOLINK A3002R routers that allows r | |
| 6577 | CVE-2025-31204 |
|
38.2th | 8.8 | This is a memory corruption vulnerability in Apple's WebKit browser engine affecting multiple Apple | |
| 6578 | CVE-2025-28062 |
|
38.1th | 8.1 | A Cross-Site Request Forgery vulnerability in ERPNEXT allows attackers to trick authenticated users | |
| 6579 | CVE-2025-32896 |
|
38.1th | 6.5 | Unauthorized attackers can exploit Apache SeaTunnel's REST API to read arbitrary files and perform d | |
| 6580 | CVE-2025-53888 |
|
38.2th | 9.8 | RIOT-OS versions up to 2025.04 have a buffer overflow vulnerability in the l2filter_add() function w | |
| 6581 | CVE-2025-5314 |
|
38.1th | 6.1 | This vulnerability allows unauthenticated attackers to inject malicious JavaScript via the 'pdf-sour | |
| 6582 | CVE-2025-61788 |
|
38.2th | 5.4 | Opencast versions before 17.8 and 18.2 have a stored cross-site scripting (XSS) vulnerability where | |
| 6583 | CVE-2025-13525 |
|
38.2th | 6.1 | The WP Directory Kit WordPress plugin has a reflected cross-site scripting (XSS) vulnerability in th | |
| 6584 | CVE-2025-62053 |
|
38.2th | 8.0 | This CVE describes a PHP remote file inclusion vulnerability in the Houzez WordPress theme. Attacker | |
| 6585 | CVE-2026-2096 |
|
38.1th | 9.8 | Agentflow software by Flowring has a Missing Authentication vulnerability (CWE-288) that allows unau | |
| 6586 | CVE-2025-64407 |
|
38.2th | 5.3 | Apache OpenOffice versions through 4.1.15 have an authorization vulnerability where specially crafte | |
| 6587 | CVE-2025-12531 |
|
38.1th | 7.1 | IBM InfoSphere Information Server versions 11.7.0.0 through 11.7.1.6 contain an XML external entity | |
| 6588 | CVE-2025-67897 |
|
38.1th | 5.3 | This vulnerability in Sequoia PGP library versions before 2.1.0 allows remote attackers to crash app | |
| 6589 | CVE-2026-21643 |
|
38.1th | 9.8 | An unauthenticated SQL injection vulnerability in Fortinet FortiClientEMS allows attackers to execut | |
| 6590 | CVE-2025-21403 |
|
37.9th | 6.4 | This vulnerability in On-Premises Data Gateway allows unauthorized access to sensitive information s | |
| 6591 | CVE-2025-1681 |
|
38th | 5.4 | The Cardealer WordPress theme has a vulnerability that allows authenticated users with subscriber-le | |
| 6592 | CVE-2025-0592 |
|
38th | 8.8 | This vulnerability allows remote attackers with low privileges to execute arbitrary shell commands b | |
| 6593 | CVE-2025-31529 |
|
37.9th | 4.3 | A missing authorization vulnerability in the Slider Path for Elementor WordPress plugin allows attac | |
| 6594 | CVE-2025-31417 |
|
37.9th | 4.3 | This CVE describes a Missing Authorization vulnerability in the WP Docs WordPress plugin that allows | |
| 6595 | CVE-2025-30909 |
|
37.9th | 4.3 | This CVE describes a missing authorization vulnerability in the Conversios.io WordPress plugin that | |
| 6596 | CVE-2025-30851 |
|
37.9th | 4.3 | This CVE describes a missing authorization vulnerability in the Tickera WordPress plugin that allows | |
| 6597 | CVE-2025-2757 |
|
38th | 6.3 | A critical heap-based buffer overflow vulnerability in Assimp's MD5 file parser allows remote attack | |
| 6598 | CVE-2025-2754 |
|
38th | 6.3 | A critical heap-based buffer overflow vulnerability in Assimp's AC3D file handler allows remote atta | |
| 6599 | CVE-2025-30346 |
|
38th | 5.4 | This vulnerability allows attackers to perform client-side desync attacks via HTTP/1 requests agains | |
| 6600 | CVE-2024-7053 |
|
38th | 9.0 | This vulnerability allows an attacker with a user-level account to perform a session fixation attack |
What is EPSS?
The Exploit Prediction Scoring System (EPSS) is a data-driven model developed by FIRST.org that estimates the probability a CVE will be exploited in the wild within the next 30 days. Unlike CVSS which measures severity, EPSS measures likelihood of exploitation — making it ideal for prioritizing which vulnerabilities to patch first.
Why EPSS matters: With thousands of CVEs published monthly, not all vulnerabilities are equally dangerous. EPSS helps security teams focus on the CVEs most likely to be actively exploited, rather than patching solely by CVSS score. A critical CVSS 9.8 vulnerability with 0.1% EPSS may be less urgent than a high CVSS 7.5 with 90% EPSS.
Prioritize by Exploit Risk
Scan your servers and see which vulnerabilities have the highest EPSS scores. Focus on what attackers are actually targeting.
Start Monitoring Free