Most Exploitable CVEs - EPSS Rankings

CVEs ranked by EPSS (Exploit Prediction Scoring System) probability. Higher scores mean a greater likelihood of exploitation in the wild within the next 30 days.

164
EPSS > 50%
156
CISA KEV Listed
35,468
CVEs with EPSS
0.7%
Avg EPSS Score
All Critical High Medium Low
Rank CVE ID EPSS Score Percentile CVSS Flags Summary
7151 CVE-2025-41707
0.16%
36.3th 5.3 This CVE describes a denial-of-service vulnerability in a websocket handler where an unauthenticated
7152 CVE-2025-41706
0.16%
36.3th 5.3 This CVE describes a denial-of-service vulnerability in a webserver where an unauthenticated remote
7153 CVE-2025-35062
0.16%
36.3th 5.3 Newforma Info Exchange (NIX) before version 2023.1 has a default configuration that allows anonymous
7154 CVE-2025-43905
0.16%
36.3th 4.3 This vulnerability allows low-privileged remote attackers to inject malicious arguments into command
7155 CVE-2025-54153
0.16%
36.3th 8.8 An SQL injection vulnerability in Qsync Central allows authenticated remote attackers to execute arb
7156 CVE-2025-53595
0.16%
36.3th 8.8 An SQL injection vulnerability in Qsync Central allows authenticated attackers to execute arbitrary
7157 CVE-2025-52656
0.16%
36.3th 7.6 CVE-2025-52656 is a mass assignment vulnerability in HCL MyXalytics 6.6 that allows attackers to mod
7158 CVE-2024-56804
0.16%
36.3th 8.8 This SQL injection vulnerability in QNAP Video Station allows authenticated attackers to execute arb
7159 CVE-2025-62630
0.16%
36.3th 8.8 This vulnerability allows attackers to upload malicious configuration files that bypass directory tr
7160 CVE-2025-2296
0.16%
36.3th N/A CVE-2025-2296 is an improper input validation vulnerability in EDK2 BIOS/UEFI firmware that allows l
7161 CVE-2025-12386
0.16%
36.3th N/A The Pix-Link LV-WR21Q access point has an authentication bypass vulnerability in its /goform/getHome
7162 CVE-2024-13457
0.15%
36.2th 5.3 The Event Tickets and Registration WordPress plugin has an Insecure Direct Object Reference vulnerab
7163 CVE-2025-24530
0.15%
36.2th 6.4 This is a cross-site scripting (XSS) vulnerability in phpMyAdmin's check tables feature. Attackers c
7164 CVE-2023-37037
0.15%
36.2th 6.5 This vulnerability allows network-adjacent attackers to crash the Mobile Management Entity (MME) in
7165 CVE-2023-37033
0.15%
36.2th 6.5 A null pointer dereference vulnerability in Magma's Mobile Management Entity (MME) allows network-ad
7166 CVE-2023-37030
0.15%
36.2th 6.5 A null pointer dereference vulnerability in Magma's Mobile Management Entity (MME) allows network-ad
7167 CVE-2025-20630
0.15%
36.2th 6.5 Mattermost Mobile versions up to 2.22.0 contain a type casting vulnerability where posts with attach
7168 CVE-2024-13351
0.15%
36.2th 7.2 This vulnerability allows authenticated WordPress users with contributor-level access or higher to i
7169 CVE-2024-48886
0.15%
36.2th 9.0 This vulnerability allows attackers to bypass weak authentication mechanisms in multiple Fortinet pr
7170 CVE-2024-11497
0.15%
36.1th 8.8 This vulnerability allows authenticated attackers to escalate privileges and gain root access on aff
7171 CVE-2025-0336
0.15%
36.2th 6.3 A critical SQL injection vulnerability in Codezips Project Management System 1.0 allows remote attac
7172 CVE-2024-13104
0.15%
36.2th 5.3 This vulnerability allows remote attackers to bypass authentication and access WiFi settings on affe
7173 CVE-2025-0764
0.15%
36.2th 6.5 The wpForo Forum WordPress plugin has an arbitrary file read vulnerability that allows authenticated
7174 CVE-2025-26529
0.15%
36.2th 8.3 This stored cross-site scripting (XSS) vulnerability in Moodle's site administration live log allows
7175 CVE-2024-52902
0.15%
36.2th 8.8 IBM Cognos Controller and IBM Controller client applications contain hard-coded database passwords i
7176 CVE-2024-13691
0.15%
36.2th 6.5 The Uncode WordPress theme has a vulnerability that allows authenticated attackers with Subscriber-l
7177 CVE-2024-56132
0.15%
36.2th 8.4 This CVE-2024-56132 is an OS command injection vulnerability in Progress LoadMaster that allows auth
7178 CVE-2025-30353
0.15%
36.2th 8.6 This vulnerability in Directus exposes sensitive data including environmental variables, API keys, a
7179 CVE-2024-12295
0.15%
36.1th 8.8 The BoomBox Theme Extensions WordPress plugin allows authenticated attackers with subscriber-level a
7180 CVE-2024-13376
0.15%
36.1th 8.8 The Industrial WordPress theme has a privilege escalation vulnerability that allows authenticated at
7181 CVE-2025-27911
0.15%
36.2th 6.5 This vulnerability in Datalust Seq allows attackers to bypass event body size limits by exploiting i
7182 CVE-2025-24349
0.15%
36.2th 7.1 This vulnerability allows authenticated low-privileged attackers to delete physical network interfac
7183 CVE-2023-42404
0.15%
36.2th 4.9 This vulnerability in OneVision Workspace allows attackers to execute arbitrary Java Expression Lang
7184 CVE-2025-28354
0.15%
36.2th 6.5 This vulnerability allows attackers to perform directory traversal attacks via crafted POST requests
7185 CVE-2025-30690
0.15%
36.2th 7.2 This vulnerability in Oracle Solaris 11's filesystem component allows a high-privileged attacker wit
7186 CVE-2025-1500
0.15%
36.1th 5.5 This vulnerability in IBM Maximo Application Suite 9.0 allows authenticated users to upload files wi
7187 CVE-2025-6709
0.15%
36.1th 7.5 MongoDB Server is vulnerable to denial of service when processing specific date values in JSON input
7188 CVE-2025-20678
0.15%
36.2th 6.5 This vulnerability in MediaTek's IMS service allows remote denial of service attacks when a user equ
7189 CVE-2026-21531
0.15%
36.2th 9.8 This critical vulnerability in Azure SDK allows remote code execution through deserialization of unt
7190 CVE-2025-59474
0.15%
36.2th 5.3 This vulnerability allows attackers without Overall/Read permission in Jenkins to list agent names t
7191 CVE-2025-58162
0.15%
36.2th 6.5 CVE-2025-58162 is an arbitrary file write vulnerability in MobSF version 4.4.0. Authenticated users
7192 CVE-2025-57563
0.15%
36.2th 6.5 This vulnerability allows unauthenticated attackers to read arbitrary files on systems running vulne
7193 CVE-2025-36354
0.15%
36.2th 7.3 This vulnerability allows unauthenticated attackers to execute arbitrary commands with limited privi
7194 CVE-2025-15275
0.15%
36.1th 8.8 A heap-based buffer overflow vulnerability in FontForge's SFD file parser allows remote attackers to
7195 CVE-2025-67436
0.15%
36.2th 6.5 CVE-2025-67436 is an authenticated remote code execution vulnerability in PluXml CMS 5.8.22. Attacke
7196 CVE-2025-64447
0.15%
36.2th 8.1 This vulnerability allows unauthenticated attackers to execute arbitrary operations on FortiWeb web
7197 CVE-2025-64153
0.15%
36.2th 7.2 This CVE describes an OS command injection vulnerability in Fortinet FortiExtender devices that allo
7198 CVE-2025-26489
0.15%
36.1th 6.5 This vulnerability allows remote authenticated users to send specially crafted XML payloads to the N
7199 CVE-2026-20962
0.15%
36.2th 4.4 This vulnerability involves uninitialized resource usage in Dynamic Root of Trust for Measurement (D
7200 CVE-2024-57162
0.15%
36th 7.2 Campcodes Cybercafe Management System v1.0 contains a SQL injection vulnerability in the view-user-d

What is EPSS?

The Exploit Prediction Scoring System (EPSS) is a data-driven model developed by FIRST.org that estimates the probability a CVE will be exploited in the wild within the next 30 days. Unlike CVSS which measures severity, EPSS measures likelihood of exploitation — making it ideal for prioritizing which vulnerabilities to patch first.

Why EPSS matters: With thousands of CVEs published monthly, not all vulnerabilities are equally dangerous. EPSS helps security teams focus on the CVEs most likely to be actively exploited, rather than patching solely by CVSS score. A critical CVSS 9.8 vulnerability with 0.1% EPSS may be less urgent than a high CVSS 7.5 with 90% EPSS.

Prioritize by Exploit Risk

Scan your servers and see which vulnerabilities have the highest EPSS scores. Focus on what attackers are actually targeting.

Start Monitoring Free