Most Exploitable CVEs - EPSS Rankings

CVEs ranked by EPSS (Exploit Prediction Scoring System) probability. Higher scores mean a greater likelihood of exploitation in the wild within the next 30 days.

164
EPSS > 50%
156
CISA KEV Listed
35,468
CVEs with EPSS
0.7%
Avg EPSS Score
All Critical High Medium Low
Rank CVE ID EPSS Score Percentile CVSS Flags Summary
6901 CVE-2024-46412
0.05%
14.9th 6.5 This vulnerability allows attackers to bypass authentication in Rebuild v3.7.7 by sending a speciall
6902 CVE-2026-20819
0.05%
14.9th 5.5 This vulnerability allows an authorized attacker to exploit an untrusted pointer dereference in Wind
6903 CVE-2025-40806
0.05%
14.9th 5.3 Gridscale X Prepay versions before V4.2.1 have a user enumeration vulnerability where attackers can
6904 CVE-2024-45775
0.05%
14.7th 5.2 This CVE describes a memory allocation failure vulnerability in grub2's grub_extcmd_dispatcher() fun
6905 CVE-2024-5200
0.05%
14.9th 4.8 This vulnerability in the Postie WordPress plugin allows administrators to inject malicious scripts
6906 CVE-2026-20829
0.05%
14.9th 5.5 This vulnerability is an out-of-bounds read in Windows TPM (Trusted Platform Module) that allows an
6907 CVE-2024-13940
0.05%
14.7th 5.5 The Ninja Forms Webhooks plugin for WordPress has a Server-Side Request Forgery (SSRF) vulnerability
6908 CVE-2025-58841
0.05%
14.8th 5.5 This vulnerability allows authenticated users with lower privileges to escalate their permissions wi
6909 CVE-2025-11667
0.05%
14.9th 6.3 This SQL injection vulnerability in Automated Voting System 1.0 allows attackers to manipulate datab
6910 CVE-2025-22171
0.05%
14.8th 4.3 Jira Align has an authorization vulnerability where low-privilege users can modify other users' priv
6911 CVE-2025-46559
0.05%
14.7th 5.4 This vulnerability in Misskey allows malicious AiScript code to bypass API endpoint restrictions by
6912 CVE-2026-20835
0.05%
14.9th 5.5 This vulnerability allows an authorized attacker to perform an out-of-bounds read in the Capability
6913 CVE-2025-60094
0.05%
14.7th 4.3 This CVE describes a missing authorization vulnerability in the Stackable WordPress plugin that allo
6914 CVE-2025-5430
0.05%
14.9th 6.3 This critical SQL injection vulnerability in AssamLook CMS 1.0 allows remote attackers to execute ar
6915 CVE-2026-1964
0.05%
14.7th 4.3 This vulnerability in WeKan allows improper access controls through the REST endpoint, potentially e
6916 CVE-2025-12713
0.05%
14.9th 6.4 The Soundslides WordPress plugin has a stored XSS vulnerability that allows authenticated attackers
6917 CVE-2025-10804
0.05%
14.9th 6.3 This SQL injection vulnerability in Campcodes Online Beauty Parlor Management System 1.0 allows atta
6918 CVE-2025-48444
0.05%
14.9th 5.3 This CVE describes a Missing Authorization vulnerability in Drupal's Quick Node Block module that al
6919 CVE-2025-31144
0.05%
14.6th 5.8 Quick Agent V3 and V2 contain an improper restriction of communication channel vulnerability (CWE-92
6920 CVE-2025-10805
0.05%
14.9th 6.3 This SQL injection vulnerability in Campcodes Online Beauty Parlor Management System 1.0 allows atta
6921 CVE-2025-25146
0.05%
14.8th 4.3 This CSRF vulnerability in the Songkick Concerts and Festivals WordPress plugin allows attackers to
6922 CVE-2025-11469
0.05%
14.9th 6.3 This SQL injection vulnerability in SourceCodester Hotel and Lodge Management System 1.0 allows atta
6923 CVE-2025-53864
0.05%
14.9th 5.8 This vulnerability allows remote attackers to cause denial of service in Connect2id Nimbus JOSE + JW
6924 CVE-2025-13573
0.05%
14.8th 6.3 This vulnerability allows remote attackers to upload malicious files via the /add_book.php endpoint
6925 CVE-2025-4944
0.05%
14.6th 6.4 This vulnerability allows authenticated WordPress users with contributor-level access or higher to i
6926 CVE-2024-58005
0.05%
14.7th 5.5 This CVE addresses a memory allocation vulnerability in the Linux kernel's TPM (Trusted Platform Mod
6927 CVE-2025-13576
0.05%
14.8th 6.3 CVE-2025-13576 is an improper authorization vulnerability in code-projects Blog Site 1.0 that allows
6928 CVE-2025-12298
0.05%
14.6th 4.3 A cross-site scripting (XSS) vulnerability exists in code-projects Simple Food Ordering System 1.0,
6929 CVE-2025-58664
0.05%
14.7th 4.3 This CVE describes a missing authorization vulnerability in the Azizul Hasan Text To Speech TTS Acce
6930 CVE-2025-12299
0.05%
14.6th 4.3 This vulnerability allows attackers to inject malicious scripts into the Simple Food Ordering System
6931 CVE-2025-58666
0.05%
14.7th 4.3 This CVE describes a missing authorization vulnerability in the Kommo Website Chat Button WordPress
6932 CVE-2025-10806
0.05%
14.9th 6.3 This SQL injection vulnerability in Campcodes Online Beauty Parlor Management System 1.0 allows atta
6933 CVE-2025-10807
0.05%
14.9th 6.3 This SQL injection vulnerability in Campcodes Online Beauty Parlor Management System 1.0 allows atta
6934 CVE-2025-11265
0.05%
14.9th 6.4 This vulnerability allows authenticated WordPress users with Contributor-level access or higher to i
6935 CVE-2025-14195
0.05%
14.8th 6.3 This vulnerability allows remote attackers to upload arbitrary files to the Employee Profile Managem
6936 CVE-2025-11478
0.05%
14.9th 6.3 This SQL injection vulnerability in SourceCodester Farm Management System 1.0 allows attackers to ma
6937 CVE-2025-12300
0.05%
14.6th 4.3 This vulnerability allows attackers to inject malicious scripts into the Simple Food Ordering System
6938 CVE-2026-1062
0.05%
14.6th 6.3 This CVE describes a Server-Side Request Forgery (SSRF) vulnerability in xiweicheng TMS up to versio
6939 CVE-2025-60122
0.05%
14.7th 4.3 This CVE describes a missing authorization vulnerability in the HivePress Claim Listings WordPress p
6940 CVE-2025-60123
0.05%
14.7th 4.3 This CVE describes a missing authorization vulnerability in the HivePress Claim Listings WordPress p
6941 CVE-2026-23569
0.05%
14.6th 6.5 An out-of-bounds read vulnerability in TeamViewer DEX Client's Content Distribution Service allows r
6942 CVE-2025-43392
0.05%
14.7th 4.3 This vulnerability allows malicious websites to bypass same-origin policy protections and exfiltrate
6943 CVE-2025-59449
0.05%
14.8th 4.9 The YoSmart YoLink MQTT broker has insufficient authorization controls that allow cross-account atta
6944 CVE-2025-10303
0.05%
14.7th 4.3 This vulnerability allows authenticated WordPress users with Subscriber-level access or higher to mo
6945 CVE-2026-2010
0.05%
14.7th 4.2 This CVE describes an improper authorization vulnerability in Sanluan PublicCMS's trade payment hand
6946 CVE-2025-60128
0.05%
14.7th 4.3 This CVE describes a missing authorization vulnerability in the WordPress Delisho plugin that allows
6947 CVE-2025-36094
0.05%
14.6th 5.4 This vulnerability in IBM Cloud Pak for Business Automation allows authenticated users to cause deni
6948 CVE-2025-36636
0.05%
14.7th 4.3 This vulnerability allows authenticated users in Tenable Security Center to access resources beyond
6949 CVE-2025-62605
0.05%
14.9th 4.3 This vulnerability allows attackers to bypass quote controls in Mastodon by reblogging a post and th
6950 CVE-2025-11481
0.05%
14.9th 6.3 This CVE describes an SQL injection vulnerability in the Blood-Bank-And-Donation-Management-System's

What is EPSS?

The Exploit Prediction Scoring System (EPSS) is a data-driven model developed by FIRST.org that estimates the probability a CVE will be exploited in the wild within the next 30 days. Unlike CVSS which measures severity, EPSS measures likelihood of exploitation — making it ideal for prioritizing which vulnerabilities to patch first.

Why EPSS matters: With thousands of CVEs published monthly, not all vulnerabilities are equally dangerous. EPSS helps security teams focus on the CVEs most likely to be actively exploited, rather than patching solely by CVSS score. A critical CVSS 9.8 vulnerability with 0.1% EPSS may be less urgent than a high CVSS 7.5 with 90% EPSS.

Prioritize by Exploit Risk

Scan your servers and see which vulnerabilities have the highest EPSS scores. Focus on what attackers are actually targeting.

Start Monitoring Free