Most Exploitable CVEs - EPSS Rankings

CVEs ranked by EPSS (Exploit Prediction Scoring System) probability. Higher scores mean a greater likelihood of exploitation in the wild within the next 30 days.

164
EPSS > 50%
156
CISA KEV Listed
35,468
CVEs with EPSS
0.7%
Avg EPSS Score
All Critical High Medium Low
Rank CVE ID EPSS Score Percentile CVSS Flags Summary
7051 CVE-2025-22408
0.16%
36.6th 9.8 CVE-2025-22408 is a critical use-after-free vulnerability in Android's Bluetooth stack that allows r
7052 CVE-2025-27129
0.16%
36.7th 9.8 An authentication bypass vulnerability in Tenda AC6 routers allows attackers to bypass HTTP authenti
7053 CVE-2025-60801
0.16%
36.7th 8.2 jshERP up to commit fbda24da contains an unauthenticated remote code execution vulnerability in the
7054 CVE-2025-61132
0.16%
36.6th 7.1 A Host Header Injection vulnerability in levlaz braindump v0.4.14 allows attackers to manipulate pas
7055 CVE-2025-62417
0.16%
36.6th 7.8 Bagisto eCommerce platform versions before 2.3.8 accept product data starting with spreadsheet formu
7056 CVE-2025-12021
0.16%
36.7th 6.1 The WP-OAuth WordPress plugin contains a reflected cross-site scripting (XSS) vulnerability in the '
7057 CVE-2025-13383
0.16%
36.7th 6.1 This stored XSS vulnerability in the Job Board WordPress plugin allows unauthenticated attackers to
7058 CVE-2025-12746
0.16%
36.7th 6.1 The Tainacan WordPress plugin is vulnerable to Reflected Cross-Site Scripting (XSS) via the 'search'
7059 CVE-2025-11093
0.16%
36.7th 8.4 This CVE describes an arbitrary code execution vulnerability in WSO2 integration products where auth
7060 CVE-2025-11920
0.16%
36.7th 8.8 The WPCOM Member WordPress plugin has a Local File Inclusion vulnerability that allows authenticated
7061 CVE-2024-45539
0.16%
36.7th 7.5 An out-of-bounds write vulnerability in CGI components of Synology DiskStation Manager (DSM) and Uni
7062 CVE-2025-66032
0.16%
36.7th 9.8 CVE-2025-66032 is a command injection vulnerability in Claude Code that allows bypassing read-only v
7063 CVE-2025-57156
0.16%
36.7th 7.5 A NULL pointer dereference vulnerability in owntone-server's DACP reply handling allows remote attac
7064 CVE-2025-67268
0.16%
36.6th 9.8 This vulnerability in gpsd allows attackers to trigger heap-based out-of-bounds writes by sending sp
7065 CVE-2025-22303
0.16%
36.6th 5.3 This vulnerability in WP Mailster WordPress plugin allows attackers to retrieve embedded sensitive d
7066 CVE-2024-12439
0.16%
36.5th 6.4 The Marketplace Items WordPress plugin has a stored XSS vulnerability that allows authenticated atta
7067 CVE-2024-11887
0.16%
36.5th 6.4 The Geo Content WordPress plugin has a stored XSS vulnerability in its 'geotargetlygeocontent' short
7068 CVE-2024-12445
0.16%
36.5th 6.4 The RightMessage WordPress plugin has a stored cross-site scripting (XSS) vulnerability that allows
7069 CVE-2025-22208
0.16%
36.6th 4.7 A SQL injection vulnerability in the JS Jobs plugin for Joomla allows authenticated administrator us
7070 CVE-2025-1970
0.16%
36.6th 7.6 This Server-Side Request Forgery vulnerability in the Export and Import Users and Customers WordPres
7071 CVE-2024-13771
0.16%
36.5th 9.8 This vulnerability allows unauthenticated attackers to reset passwords for any user account in the C
7072 CVE-2025-23360
0.16%
36.6th 7.1 CVE-2025-23360 is a relative path traversal vulnerability in NVIDIA Nemo Framework that allows authe
7073 CVE-2025-26702
0.16%
36.6th 4.9 An improper input validation vulnerability in ZTE GoldenDB allows attackers to manipulate input data
7074 CVE-2025-24341
0.16%
36.5th 6.5 A vulnerability in ctrlX OS web application allows authenticated low-privileged attackers to cause d
7075 CVE-2025-3487
0.16%
36.6th 6.4 This vulnerability allows authenticated WordPress users with Contributor-level access or higher to i
7076 CVE-2025-39396
0.16%
36.5th 7.5 This vulnerability allows attackers to include local files on the server through improper filename c
7077 CVE-2025-39364
0.16%
36.5th 7.5 This vulnerability allows attackers to include local files on the server through improper filename c
7078 CVE-2025-48136
0.16%
36.5th 7.5 This vulnerability allows attackers to include local files on the server through improper filename c
7079 CVE-2025-39507
0.16%
36.5th 7.5 This vulnerability allows attackers to include local files on the server through improper filename c
7080 CVE-2025-47653
0.16%
36.5th 7.5 This vulnerability allows attackers to include local files on the server through improper filename c
7081 CVE-2025-47531
0.16%
36.5th 7.5 This vulnerability allows attackers to include local files on the server through improper filename c
7082 CVE-2025-47510
0.16%
36.5th 7.5 This vulnerability allows attackers to include local PHP files through improper filename control in
7083 CVE-2025-47508
0.16%
36.5th 7.5 This CVE describes a PHP Local File Inclusion vulnerability in the GamiPress WordPress plugin. Attac
7084 CVE-2025-47498
0.16%
36.5th 7.5 This vulnerability allows attackers to include local files on the server through improper filename c
7085 CVE-2025-47496
0.16%
36.5th 7.5 This vulnerability allows attackers to include local files on the server through improper filename c
7086 CVE-2025-47494
0.16%
36.5th 7.5 This vulnerability allows attackers to include local files on the server through improper filename c
7087 CVE-2025-47439
0.16%
36.5th 7.5 This vulnerability allows attackers to include local files on the server through improper filename c
7088 CVE-2023-47031
0.16%
36.5th 9.8 This vulnerability allows remote attackers to escalate privileges in NCR Terminal Handler v1.5.1 by
7089 CVE-2025-29828
0.16%
36.5th 8.1 This memory leak vulnerability in Windows Cryptographic Services allows remote attackers to execute
7090 CVE-2025-50173
0.16%
36.6th 7.8 CVE-2025-50173 is a Windows Installer vulnerability where weak authentication mechanisms allow authe
7091 CVE-2025-10224
0.16%
36.6th 5.4 This vulnerability in AxxonSoft Axxon One (C-Werk) allows authenticated remote attackers to bypass p
7092 CVE-2025-59429
0.16%
36.6th 5.4 This CVE describes a reflected cross-site scripting (XSS) vulnerability in FreePBX, an open-source G
7093 CVE-2025-53412
0.16%
36.6th 6.5 A NULL pointer dereference vulnerability in QNAP File Station 5 allows authenticated remote attacker
7094 CVE-2025-53408
0.16%
36.6th 6.5 A NULL pointer dereference vulnerability in QNAP File Station 5 allows authenticated attackers to ca
7095 CVE-2025-47207
0.16%
36.6th 6.5 A NULL pointer dereference vulnerability in QNAP File Station allows authenticated attackers to caus
7096 CVE-2025-20343
0.16%
36.6th 8.6 An unauthenticated remote attacker can cause Cisco Identity Services Engine (ISE) to restart unexpec
7097 CVE-2026-24036
0.16%
36.6th 5.3 This vulnerability in Horilla HRMS allows unauthenticated attackers to view unpublished job postings
7098 CVE-2025-11250
0.16%
36.5th 9.1 This authentication bypass vulnerability in ManageEngine ADSelfService Plus allows attackers to circ
7099 CVE-2025-23012
0.16%
36.4th 7.5 Fedora Repository 3.8.x includes a service account (fedoraIntCallUser) with default credentials that
7100 CVE-2024-38337
0.16%
36.5th 9.1 IBM Sterling Secure Proxy versions 6.0.0.0 through 6.2.0.0 contain incorrect permission assignments

What is EPSS?

The Exploit Prediction Scoring System (EPSS) is a data-driven model developed by FIRST.org that estimates the probability a CVE will be exploited in the wild within the next 30 days. Unlike CVSS which measures severity, EPSS measures likelihood of exploitation — making it ideal for prioritizing which vulnerabilities to patch first.

Why EPSS matters: With thousands of CVEs published monthly, not all vulnerabilities are equally dangerous. EPSS helps security teams focus on the CVEs most likely to be actively exploited, rather than patching solely by CVSS score. A critical CVSS 9.8 vulnerability with 0.1% EPSS may be less urgent than a high CVSS 7.5 with 90% EPSS.

Prioritize by Exploit Risk

Scan your servers and see which vulnerabilities have the highest EPSS scores. Focus on what attackers are actually targeting.

Start Monitoring Free