Most Exploitable CVEs - EPSS Rankings

CVEs ranked by EPSS (Exploit Prediction Scoring System) probability. Higher scores mean a greater likelihood of exploitation in the wild within the next 30 days.

164
EPSS > 50%
156
CISA KEV Listed
35,468
CVEs with EPSS
0.7%
Avg EPSS Score
All Critical High Medium Low
Rank CVE ID EPSS Score Percentile CVSS Flags Summary
6651 CVE-2025-9229
0.05%
15.3th 5.3 An information disclosure vulnerability in MiR robot software allows unauthenticated attackers to ac
6652 CVE-2025-5421
0.05%
15.3th 6.3 This critical vulnerability in juzaweb CMS allows unprivileged users to access the plugin editor pag
6653 CVE-2025-23333
0.05%
15.3th 5.9 CVE-2025-23333 is an out-of-bounds read vulnerability in NVIDIA Triton Inference Server's Python bac
6654 CVE-2025-5423
0.05%
15.3th 6.3 This vulnerability allows unprivileged users to modify general system settings in juzaweb CMS due to
6655 CVE-2025-27137
0.05%
15.3th 4.4 This vulnerability allows authenticated users with SYSTEM_CONFIGURATION permission in Dependency-Tra
6656 CVE-2025-59716
0.05%
15.5th 5.3 This vulnerability in ownCloud Guests allows unauthenticated attackers to enumerate valid pending gu
6657 CVE-2025-45388
0.05%
15.6th 6.1 Wagtail CMS 6.4.1 has a stored XSS vulnerability in document upload functionality where attackers ca
6658 CVE-2026-20823
0.05%
15.5th 5.5 This vulnerability allows an authorized attacker with local access to a Windows system to access sen
6659 CVE-2025-34254
0.05%
15.3th 5.3 This vulnerability allows unauthenticated remote attackers to enumerate valid usernames on D-Link Nu
6660 CVE-2025-13097
0.05%
15.3th 5.4 This vulnerability allows a remote attacker to escape Chrome's sandbox protection through a crafted
6661 CVE-2025-34255
0.05%
15.3th 5.3 This vulnerability allows unauthenticated attackers to enumerate valid email addresses on D-Link Nuc
6662 CVE-2026-0831
0.05%
15.3th 5.3 The Templately WordPress plugin has an arbitrary file write vulnerability that allows unauthenticate
6663 CVE-2026-20827
0.05%
15.5th 5.5 This vulnerability allows an authorized attacker with local access to a Windows system to access sen
6664 CVE-2025-5425
0.05%
15.3th 6.3 CVE-2025-5425 is a critical improper access control vulnerability in juzaweb CMS that allows unprivi
6665 CVE-2025-20348
0.05%
15.4th 5.0 This vulnerability allows authenticated low-privileged attackers to bypass authorization controls on
6666 CVE-2025-22030
0.05%
15.4th 5.5 A deadlock vulnerability in the Linux kernel's zswap memory compression subsystem that can cause sys
6667 CVE-2025-5428
0.05%
15.3th 6.3 This critical vulnerability in juzaweb CMS allows unprivileged users to access and potentially delet
6668 CVE-2025-46335
0.05%
15.3th 5.4 A stored cross-site scripting (XSS) vulnerability in Mobile Security Framework (MobSF) allows attack
6669 CVE-2025-58649
0.05%
15.3th 4.3 This vulnerability in All In One SEO Pack WordPress plugin exposes sensitive embedded data through s
6670 CVE-2025-60092
0.05%
15.4th 5.3 This vulnerability in Shahjada Download Manager WordPress plugin allows unauthorized users to retrie
6671 CVE-2025-60095
0.05%
15.3th 4.3 This vulnerability in the Stackable WordPress plugin allows attackers to retrieve embedded sensitive
6672 CVE-2026-20838
0.05%
15.5th 5.5 This Windows Kernel vulnerability allows authenticated local attackers to extract sensitive informat
6673 CVE-2025-67316
0.05%
15.3th 5.4 This vulnerability allows remote attackers to execute arbitrary code on devices running realme Inter
6674 CVE-2025-65237
0.05%
15.4th 6.1 This reflected cross-site scripting (XSS) vulnerability in OpenCode Systems USSD Gateway allows atta
6675 CVE-2025-63420
0.05%
15.3th 4.1 CVE-2025-63420 is a stored HTML injection vulnerability in CrushFTP11's admin panel that allows atta
6676 CVE-2025-12129
0.05%
15.4th 5.3 The CubeWP WordPress plugin has an information exposure vulnerability that allows unauthenticated at
6677 CVE-2025-9031
0.05%
15.3th 4.3 This CVE describes an Observable Timing Discrepancy vulnerability in DivvyDrive Web that allows atta
6678 CVE-2025-4512
0.05%
15.4th 4.3 This vulnerability allows attackers to inject malicious scripts into the Inetum IODAS web interface
6679 CVE-2024-13138
0.05%
15.3th 4.7 This vulnerability allows remote attackers to upload arbitrary files without restrictions in wangl19
6680 CVE-2025-62292
0.05%
15.3th 4.3 This vulnerability allows authenticated low-privileged users in SonarQube to access sensitive user i
6681 CVE-2026-20862
0.05%
15.5th 5.5 This vulnerability in Windows Management Services allows an authenticated attacker to access sensiti
6682 CVE-2025-13200
0.05%
15.3th 5.3 This vulnerability in SourceCodester Farm Management System 1.0 allows attackers to remotely view di
6683 CVE-2025-9415
0.05%
15.4th 6.3 This vulnerability in GreenCMS allows attackers to upload arbitrary files without restrictions via t
6684 CVE-2025-60125
0.05%
15.4th 5.3 This vulnerability in the FoodBook WordPress plugin allows attackers to retrieve embedded sensitive
6685 CVE-2023-53032
0.05%
15.4th 5.5 This CVE describes an integer overflow vulnerability in the Linux kernel's netfilter ipset module. W
6686 CVE-2025-67427
0.05%
15.5th 6.5 A Blind Server-Side Request Forgery vulnerability in evershop allows unauthenticated attackers to fo
6687 CVE-2025-15414
0.05%
15.6th 4.7 This CVE describes a Server-Side Request Forgery (SSRF) vulnerability in go-sonic's Theme Fetching A
6688 CVE-2025-67958
0.05%
15.2th 6.5 This CVE describes a Missing Authorization vulnerability in TaxCloud for WooCommerce (simple-sales-t
6689 CVE-2025-60140
0.05%
15.4th 5.3 The Tribal WordPress plugin versions up to 1.3.3 contains a vulnerability where sensitive informatio
6690 CVE-2025-13174
0.05%
15.5th 6.3 This CVE describes a Server-Side Request Forgery (SSRF) vulnerability in the WeRSS we-mp-rss Webhook
6691 CVE-2025-59714
0.05%
15.4th 6.5 This vulnerability allows group administrators who are not Grouper system administrators to configur
6692 CVE-2025-59715
0.05%
15.3th 4.8 This reflected cross-site scripting (XSS) vulnerability in SMSEagle allows attackers to inject malic
6693 CVE-2026-20932
0.05%
15.5th 5.5 This vulnerability in Windows File Explorer allows an authorized attacker with local access to a sys
6694 CVE-2025-51060
0.05%
15.2th 6.5 This vulnerability in CPUID cpuz.sys driver allows attackers to execute arbitrary code with kernel p
6695 CVE-2025-50074
0.05%
15.5th 4.9 This vulnerability allows high-privileged attackers with network access via HTTP to access sensitive
6696 CVE-2025-50075
0.05%
15.4th 6.5 This vulnerability in Oracle Financial Services Revenue Management and Billing allows authenticated
6697 CVE-2026-20937
0.05%
15.5th 5.5 This vulnerability allows an authorized attacker with local access to a Windows system to access sen
6698 CVE-2025-53035
0.05%
15.4th 6.5 This vulnerability in Oracle Financial Services Analytical Applications Infrastructure allows authen
6699 CVE-2025-69229
0.05%
15.3th 5.3 AIOHTTP versions 3.13.2 and below contain a vulnerability where handling chunked HTTP messages can c
6700 CVE-2026-20939
0.05%
15.5th 5.5 This vulnerability allows an authorized attacker with local access to a Windows system to access sen

What is EPSS?

The Exploit Prediction Scoring System (EPSS) is a data-driven model developed by FIRST.org that estimates the probability a CVE will be exploited in the wild within the next 30 days. Unlike CVSS which measures severity, EPSS measures likelihood of exploitation — making it ideal for prioritizing which vulnerabilities to patch first.

Why EPSS matters: With thousands of CVEs published monthly, not all vulnerabilities are equally dangerous. EPSS helps security teams focus on the CVEs most likely to be actively exploited, rather than patching solely by CVSS score. A critical CVSS 9.8 vulnerability with 0.1% EPSS may be less urgent than a high CVSS 7.5 with 90% EPSS.

Prioritize by Exploit Risk

Scan your servers and see which vulnerabilities have the highest EPSS scores. Focus on what attackers are actually targeting.

Start Monitoring Free