Most Exploitable CVEs - EPSS Rankings
CVEs ranked by EPSS (Exploit Prediction Scoring System) probability. Higher scores mean a greater likelihood of exploitation in the wild within the next 30 days.
| Rank | CVE ID | EPSS Score | Percentile | CVSS | Flags | Summary |
|---|---|---|---|---|---|---|
| 6701 | CVE-2026-20937 |
|
15.5th | 5.5 | This vulnerability allows an authorized attacker with local access to a Windows system to access sen | |
| 6702 | CVE-2025-53035 |
|
15.4th | 6.5 | This vulnerability in Oracle Financial Services Analytical Applications Infrastructure allows authen | |
| 6703 | CVE-2025-69229 |
|
15.3th | 5.3 | AIOHTTP versions 3.13.2 and below contain a vulnerability where handling chunked HTTP messages can c | |
| 6704 | CVE-2026-20939 |
|
15.5th | 5.5 | This vulnerability allows an authorized attacker with local access to a Windows system to access sen | |
| 6705 | CVE-2025-59111 |
|
15.5th | 6.5 | Windu CMS version 4.1 has a broken access control vulnerability in user editing functionality that a | |
| 6706 | CVE-2025-55621 |
|
15.4th | 6.5 | An Insecure Direct Object Reference (IDOR) vulnerability in Reolink v4.54.0.4.20250526 allows unauth | |
| 6707 | CVE-2025-68019 |
|
15.2th | 6.5 | This CVE describes a Missing Authorization vulnerability in the SEO Booster WordPress plugin that al | |
| 6708 | CVE-2025-66373 |
|
15.6th | 4.8 | CVE-2025-66373 is an HTTP request smuggling vulnerability in Akamai Ghost on Akamai CDN edge servers | |
| 6709 | CVE-2025-64148 |
|
15.4th | 4.3 | The Jenkins Publish to Bitbucket Plugin before version 0.5 has a missing permission check that allow | |
| 6710 | CVE-2025-60167 |
|
15.3th | 4.3 | This vulnerability in Page Manager for Elementor WordPress plugin exposes sensitive system informati | |
| 6711 | CVE-2025-59582 |
|
15.4th | 5.3 | This vulnerability in the WordPress Ajax Load More plugin allows unauthorized users to retrieve embe | |
| 6712 | CVE-2025-15482 |
|
15.4th | 5.3 | The Chapa Payment Gateway Plugin for WooCommerce exposes sensitive merchant API keys through an unau | |
| 6713 | CVE-2025-15508 |
|
15.4th | 5.3 | The Magic Import Document Extractor WordPress plugin exposes the site's magicimport.ai license key i | |
| 6714 | CVE-2025-15438 |
|
15.5th | 4.7 | This vulnerability in PluXml's Media Management Module allows remote attackers to execute arbitrary | |
| 6715 | CVE-2025-11581 |
|
15.5th | 5.3 | PowerJob versions up to 5.1.2 have an authorization bypass vulnerability in the OpenAPIController's | |
| 6716 | CVE-2024-53869 |
|
15.4th | 5.5 | The NVIDIA Unified Memory driver for Linux contains a vulnerability where an attacker could leak uni | |
| 6717 | CVE-2025-14856 |
|
15.5th | 6.3 | This vulnerability allows remote attackers to execute arbitrary code on RuoYi systems up to version | |
| 6718 | CVE-2025-57916 |
|
15.3th | 4.3 | The WP System Information WordPress plugin versions up to 1.5 expose sensitive system data to unauth | |
| 6719 | CVE-2022-44759 |
|
15.3th | 4.6 | This vulnerability in HCL Leap allows attackers to inject malicious scripts into SVG files, which th | |
| 6720 | CVE-2024-11922 |
|
15.3th | 6.3 | This cross-site scripting (XSS) vulnerability in Fortra's GoAnywhere web client allows authenticated | |
| 6721 | CVE-2025-57922 |
|
15.4th | 5.3 | This vulnerability in the EnvΓos Coordinadora Woocommerce WordPress plugin exposes sensitive inform | |
| 6722 | CVE-2025-57923 |
|
15.4th | 5.3 | The UK Address Postcode Validation WordPress plugin exposes API keys in sent data, allowing unauthor | |
| 6723 | CVE-2025-61754 |
|
15.4th | 6.5 | This vulnerability in Oracle BI Publisher allows authenticated attackers with low privileges to acce | |
| 6724 | CVE-2025-52647 |
|
15.4th | 6.1 | BigFix WebUI is vulnerable to Host Header Poisoning attacks where attackers can manipulate HTTP Host | |
| 6725 | CVE-2025-57937 |
|
15.3th | 4.3 | This vulnerability in the WPeMatico RSS Feed Fetcher WordPress plugin allows unauthorized users to r | |
| 6726 | CVE-2025-68558 |
|
15.2th | 6.5 | This CVE describes a Missing Authorization vulnerability in the Depicter Slider WordPress plugin tha | |
| 6727 | CVE-2025-12344 |
|
15.5th | 6.3 | This vulnerability in Yonyou U8 Cloud allows attackers to upload arbitrary files without authenticat | |
| 6728 | CVE-2025-0688 |
|
15.5th | 6.1 | This vulnerability allows attackers to execute malicious JavaScript in victims' browsers by tricking | |
| 6729 | CVE-2025-1364 |
|
15.3th | 5.3 | A critical stack-based buffer overflow vulnerability in MicroWord eScan Antivirus 7.0.32 on Linux al | |
| 6730 | CVE-2025-8344 |
|
15.4th | 6.3 | This critical vulnerability in openviglet shio allows remote attackers to upload arbitrary files wit | |
| 6731 | CVE-2025-62517 |
|
15.3th | 5.9 | This CVE describes a prototype pollution vulnerability in Rollbar.js's merge() function when rollbar | |
| 6732 | CVE-2025-68896 |
|
15.2th | 6.5 | This CVE describes a Missing Authorization vulnerability in the WordPress plugin WDV One Page Docs, | |
| 6733 | CVE-2025-13249 |
|
15.5th | 6.3 | This vulnerability allows remote attackers to upload arbitrary files to Jiusi OA systems via the Off | |
| 6734 | CVE-2025-21572 |
|
15.3th | 6.1 | OpenGrok 1.13.25 contains a reflected Cross-Site Scripting (XSS) vulnerability in its history view p | |
| 6735 | CVE-2025-14348 |
|
15.2th | 5.3 | The weMail WordPress plugin has an authorization bypass vulnerability that allows unauthenticated at | |
| 6736 | CVE-2026-24348 |
|
15.2th | 6.1 | Multiple cross-site scripting vulnerabilities in the Admin UI of EZCast Pro II allow attackers to in | |
| 6737 | CVE-2025-10282 |
|
15.4th | 4.7 | BBOT's GitLab module can leak GitLab API keys to attacker-controlled servers through maliciously for | |
| 6738 | CVE-2025-67724 |
|
15.5th | 5.4 | This vulnerability in Tornado web framework allows attackers to inject malicious content into HTTP h | |
| 6739 | CVE-2025-10749 |
|
15.4th | 5.4 | The Microsoft Azure Storage for WordPress plugin has a vulnerability that allows authenticated users | |
| 6740 | CVE-2025-7491 |
|
15.3th | 6.3 | This critical SQL injection vulnerability in PHPGurukul Vehicle Parking Management System 1.13 allow | |
| 6741 | CVE-2025-13949 |
|
15.5th | 6.3 | This vulnerability in ProudMuBai GoFilm allows attackers to upload arbitrary files without restricti | |
| 6742 | CVE-2025-3901 |
|
15.4th | 6.1 | This Cross-Site Scripting (XSS) vulnerability in Drupal's Bootstrap Site Alert module allows attacke | |
| 6743 | CVE-2026-1419 |
|
15.5th | 4.7 | This CVE describes a command injection vulnerability in D-Link DCS700l IP cameras running firmware v | |
| 6744 | CVE-2025-53023 |
|
15.4th | 4.9 | This vulnerability in MySQL Server's replication component allows authenticated high-privileged atta | |
| 6745 | CVE-2025-57202 |
|
15.4th | 6.1 | A stored cross-site scripting vulnerability in AVTECH SECURITY Corporation's DGM1104 device allows a | |
| 6746 | CVE-2025-1719 |
|
15.3th | 5.9 | IBM Concert versions 1.0.0 through 2.1.0 contain a heap memory disclosure vulnerability where sensit | |
| 6747 | CVE-2025-1722 |
|
15.3th | 5.9 | IBM Concert versions 1.0.0 through 2.1.0 contain a heap memory disclosure vulnerability where sensit | |
| 6748 | CVE-2025-12636 |
|
15.4th | 6.5 | This vulnerability in the Ubia camera ecosystem allows attackers to access improperly secured API cr | |
| 6749 | CVE-2025-31366 |
|
15.6th | 4.7 | This vulnerability allows unauthenticated attackers to perform reflected cross-site scripting (XSS) | |
| 6750 | CVE-2025-7520 |
|
15.3th | 6.3 | This critical SQL injection vulnerability in PHPGurukul Vehicle Parking Management System allows rem |
What is EPSS?
The Exploit Prediction Scoring System (EPSS) is a data-driven model developed by FIRST.org that estimates the probability a CVE will be exploited in the wild within the next 30 days. Unlike CVSS which measures severity, EPSS measures likelihood of exploitation β making it ideal for prioritizing which vulnerabilities to patch first.
Why EPSS matters: With thousands of CVEs published monthly, not all vulnerabilities are equally dangerous. EPSS helps security teams focus on the CVEs most likely to be actively exploited, rather than patching solely by CVSS score. A critical CVSS 9.8 vulnerability with 0.1% EPSS may be less urgent than a high CVSS 7.5 with 90% EPSS.
Prioritize by Exploit Risk
Scan your servers and see which vulnerabilities have the highest EPSS scores. Focus on what attackers are actually targeting.
Start Monitoring Free