Most Exploitable CVEs - EPSS Rankings
CVEs ranked by EPSS (Exploit Prediction Scoring System) probability. Higher scores mean a greater likelihood of exploitation in the wild within the next 30 days.
| Rank | CVE ID | EPSS Score | Percentile | CVSS | Flags | Summary |
|---|---|---|---|---|---|---|
| 7001 | CVE-2025-2255 |
|
36.9th | 8.7 | This vulnerability allows Cross-Site Scripting (XSS) attacks through error messages in GitLab's AppS | |
| 7002 | CVE-2025-0811 |
|
36.9th | 8.7 | This cross-site scripting vulnerability in GitLab allows attackers to inject malicious scripts throu | |
| 7003 | CVE-2025-2690 |
|
36.8th | 6.3 | This critical vulnerability in Yii2 PHP framework allows remote attackers to execute arbitrary code | |
| 7004 | CVE-2025-2219 |
|
36.9th | 7.3 | This critical vulnerability in LoveCardsV2 allows unauthenticated attackers to upload arbitrary file | |
| 7005 | CVE-2025-27526 |
|
36.8th | 6.5 | This CVE describes a deserialization vulnerability in Apache InLong that allows attackers to bypass | |
| 7006 | CVE-2025-31213 |
|
36.9th | 7.6 | This CVE describes a logging vulnerability in Apple's iCloud Keychain where sensitive data (username | |
| 7007 | CVE-2024-4025 |
|
36.8th | 6.5 | A Denial of Service vulnerability in GitLab allows attackers to crash the application by uploading s | |
| 7008 | CVE-2025-8213 |
|
36.9th | 7.2 | The NinjaScanner WordPress plugin contains an arbitrary file deletion vulnerability that allows auth | |
| 7009 | CVE-2025-49831 |
|
36.9th | 9.8 | This vulnerability allows attackers to reroute authentication requests from Secrets Manager to malic | |
| 7010 | CVE-2025-62260 |
|
36.9th | 7.5 | This vulnerability allows remote attackers to perform denial-of-service attacks against Liferay Port | |
| 7011 | CVE-2025-60553 |
|
36.8th | 9.8 | This vulnerability allows remote attackers to execute arbitrary code on D-Link DIR600L routers via a | |
| 7012 | CVE-2025-60548 |
|
36.8th | 9.8 | This vulnerability allows remote attackers to execute arbitrary code on D-Link DIR600L routers by ex | |
| 7013 | CVE-2025-53410 |
|
36.9th | 6.5 | This vulnerability in QNAP File Station 5 allows authenticated remote attackers to exhaust system re | |
| 7014 | CVE-2025-13434 |
|
36.9th | 5.3 | CVE-2025-13434 is a vulnerability in jameschz Hush Framework 2.0 where improper neutralization of th | |
| 7015 | CVE-2025-12819 |
|
36.8th | 7.5 | This vulnerability allows unauthenticated attackers to execute arbitrary SQL commands during PgBounc | |
| 7016 | CVE-2026-22238 |
|
36.9th | 9.8 | This critical vulnerability in BLUVOYIX allows unauthenticated attackers to create admin users via s | |
| 7017 | CVE-2026-22236 |
|
36.9th | 9.8 | This critical authentication bypass vulnerability in BLUVOYIX allows unauthenticated attackers to se | |
| 7018 | CVE-2026-1632 |
|
36.9th | 9.1 | MOMA Seismic Station versions v2.4.2520 and earlier expose their web management interface without re | |
| 7019 | CVE-2024-57723 |
|
36.7th | 6.5 | CVE-2024-57723 is a segmentation violation vulnerability in lunasvg's composition_source_over compon | |
| 7020 | CVE-2024-57721 |
|
36.7th | 6.5 | Lunasvg v3.0.0 contains a segmentation violation vulnerability in the plutovg_path_add_path componen | |
| 7021 | CVE-2025-0534 |
|
36.6th | 7.3 | This critical SQL injection vulnerability in the 1000 Projects Campaign Management System Platform f | |
| 7022 | CVE-2024-54660 |
|
36.8th | 8.7 | This JNDI injection vulnerability in Cloudera JDBC connectors allows attackers to inject malicious p | |
| 7023 | CVE-2025-23514 |
|
36.7th | 5.3 | This CVE describes a Missing Authorization vulnerability in the Sanjaysolutions Loginplus WordPress | |
| 7024 | CVE-2025-21340 |
|
36.7th | 5.5 | This vulnerability allows attackers to bypass Windows Virtualization-Based Security (VBS) protection | |
| 7025 | CVE-2025-25477 |
|
36.7th | 8.1 | A host header injection vulnerability in SysPass 3.2x allows attackers to inject malicious JavaScrip | |
| 7026 | CVE-2025-1293 |
|
36.6th | 8.2 | CVE-2025-1293 is an authentication bypass vulnerability in Hermes versions up to 0.4.0 that improper | |
| 7027 | CVE-2025-1426 |
|
36.6th | 8.8 | A heap buffer overflow vulnerability in Google Chrome's GPU component on Android allows remote attac | |
| 7028 | CVE-2025-1133 |
|
36.6th | 7.2 | This vulnerability allows authenticated administrators in ChurchCRM versions 5.13.0 and earlier to e | |
| 7029 | CVE-2025-26376 |
|
36.7th | 6.5 | This vulnerability allows authenticated low-privileged attackers to modify user data in Q-Free MaxTi | |
| 7030 | CVE-2025-26367 |
|
36.7th | 4.3 | This vulnerability allows authenticated low-privileged attackers to create arbitrary user groups in | |
| 7031 | CVE-2024-45386 |
|
36.8th | 8.8 | This vulnerability allows session hijacking in Siemens industrial control software. An attacker who | |
| 7032 | CVE-2025-24029 |
|
36.6th | 5.3 | CVE-2025-24029 is an improper permissions vulnerability in Tuleap that allows users (including anony | |
| 7033 | CVE-2024-7990 |
|
36.8th | 8.4 | A stored XSS vulnerability in open-webui version 0.3.8 allows attackers to inject malicious scripts | |
| 7034 | CVE-2024-52961 |
|
36.6th | 8.8 | This CVE describes an OS command injection vulnerability in Fortinet FortiSandbox that allows authen | |
| 7035 | CVE-2025-30202 |
|
36.6th | 7.5 | CVE-2025-30202 exposes vLLM's internal state data and enables denial of service attacks in multi-nod | |
| 7036 | CVE-2021-47662 |
|
36.6th | 7.5 | This vulnerability allows unauthenticated remote attackers to trigger a shutdown button via HTTPS co | |
| 7037 | CVE-2025-0272 |
|
36.8th | 5.4 | HCL DevOps Deploy/Launch is vulnerable to HTML injection, allowing authenticated users to embed arbi | |
| 7038 | CVE-2025-47453 |
|
36.7th | 8.1 | This vulnerability allows attackers to include and execute arbitrary local PHP files on WordPress si | |
| 7039 | CVE-2025-46444 |
|
36.7th | 8.1 | This vulnerability allows attackers to include local files on the server through improper filename c | |
| 7040 | CVE-2025-39494 |
|
36.7th | 8.1 | This vulnerability allows attackers to include local files on the server through improper filename c | |
| 7041 | CVE-2025-32309 |
|
36.7th | 8.1 | This vulnerability allows attackers to include local files on the server through improper filename c | |
| 7042 | CVE-2025-32294 |
|
36.7th | 8.1 | This vulnerability allows attackers to include local files on the server through improper input vali | |
| 7043 | CVE-2025-32289 |
|
36.7th | 8.1 | This vulnerability allows attackers to include local files on the server through improper filename c | |
| 7044 | CVE-2025-31912 |
|
36.7th | 8.1 | This vulnerability allows attackers to include arbitrary local files through PHP's include/require s | |
| 7045 | CVE-2025-31633 |
|
36.7th | 8.1 | This vulnerability allows attackers to include local files on the server through improper filename c | |
| 7046 | CVE-2025-31064 |
|
36.7th | 8.1 | This vulnerability allows attackers to include local files on the server through improper filename c | |
| 7047 | CVE-2025-31237 |
|
36.7th | 7.5 | A vulnerability in macOS AFP (Apple Filing Protocol) allows attackers to cause system termination (k | |
| 7048 | CVE-2025-6882 |
|
36.7th | 8.8 | A critical buffer overflow vulnerability in D-Link DIR-513 router firmware allows remote attackers t | |
| 7049 | CVE-2025-5520 |
|
36.7th | 5.3 | A reachable assertion vulnerability in Open5GS AMF/MME components allows remote attackers to cause d | |
| 7050 | CVE-2025-43728 |
|
36.7th | 9.6 | Dell ThinOS 10 contains a protection mechanism failure vulnerability that allows unauthenticated rem |
What is EPSS?
The Exploit Prediction Scoring System (EPSS) is a data-driven model developed by FIRST.org that estimates the probability a CVE will be exploited in the wild within the next 30 days. Unlike CVSS which measures severity, EPSS measures likelihood of exploitation — making it ideal for prioritizing which vulnerabilities to patch first.
Why EPSS matters: With thousands of CVEs published monthly, not all vulnerabilities are equally dangerous. EPSS helps security teams focus on the CVEs most likely to be actively exploited, rather than patching solely by CVSS score. A critical CVSS 9.8 vulnerability with 0.1% EPSS may be less urgent than a high CVSS 7.5 with 90% EPSS.
Prioritize by Exploit Risk
Scan your servers and see which vulnerabilities have the highest EPSS scores. Focus on what attackers are actually targeting.
Start Monitoring Free