Most Exploitable CVEs - EPSS Rankings

CVEs ranked by EPSS (Exploit Prediction Scoring System) probability. Higher scores mean a greater likelihood of exploitation in the wild within the next 30 days.

164
EPSS > 50%
156
CISA KEV Listed
35,468
CVEs with EPSS
0.7%
Avg EPSS Score
All Critical High Medium Low
Rank CVE ID EPSS Score Percentile CVSS Flags Summary
7251 CVE-2024-6690
0.15%
35.9th 6.1 The wccp-pro WordPress plugin before version 15.3 contains an open redirect vulnerability via the re
7252 CVE-2023-6541
0.15%
36th 6.1 The Allow SVG WordPress plugin before version 1.2.0 fails to sanitize uploaded SVG files, allowing u
7253 CVE-2025-22460
0.15%
35.9th 7.8 This vulnerability allows local authenticated attackers to escalate privileges in Ivanti Cloud Servi
7254 CVE-2025-31239
0.15%
35.9th 4.3 A use-after-free vulnerability in Apple operating systems allows parsing malicious files to cause un
7255 CVE-2025-4329
0.15%
35.9th 4.3 This vulnerability in 74CMS allows attackers to perform path traversal attacks by manipulating the '
7256 CVE-2025-5878
0.15%
35.9th 7.3 This vulnerability in ESAPI esapi-java-legacy allows SQL injection attacks through the Encoder.encod
7257 CVE-2025-32877
0.15%
35.9th 9.8 COROS PACE 3 smartwatches through firmware version 3.0808.0 incorrectly identify themselves as devic
7258 CVE-2025-41675
0.15%
35.9th 7.2 This vulnerability allows a high-privileged remote attacker to execute arbitrary operating system co
7259 CVE-2025-41673
0.15%
35.9th 7.2 This vulnerability allows authenticated high-privileged remote attackers to execute arbitrary operat
7260 CVE-2025-37102
0.15%
36th 7.2 An authenticated command injection vulnerability in HPE Networking Instant On Access Points allows a
7261 CVE-2025-4779
0.15%
36th 6.1 This stored XSS vulnerability in lunary-ai/lunary allows unauthenticated attackers to inject malicio
7262 CVE-2025-30261
0.15%
36th 6.5 This vulnerability in Qsync Central allows authenticated remote attackers to perform resource exhaus
7263 CVE-2025-29900
0.15%
36th 6.5 This vulnerability in QNAP File Station 5 allows authenticated attackers to exhaust system resources
7264 CVE-2025-29898
0.15%
36th 6.5 An uncontrolled resource consumption vulnerability in Qsync Central allows authenticated remote atta
7265 CVE-2025-10472
0.15%
35.9th 5.3 A path traversal vulnerability in MoneyPrinterTurbo allows attackers to access arbitrary files on th
7266 CVE-2025-64066
0.15%
35.9th 8.6 Primakon Pi Portal 1.0.18 has a broken access control vulnerability in its user registration endpoin
7267 CVE-2025-46427
0.15%
35.9th 8.8 Dell SmartFabric OS10 Software versions before 10.6.1.0 contain a command injection vulnerability th
7268 CVE-2025-15106
0.15%
35.9th 6.3 CVE-2025-15106 is an improper authorization vulnerability in getmaxun maxun's authentication endpoin
7269 CVE-2025-13774
0.15%
36th 8.8 An SQL injection vulnerability in Progress Flowmon ADS allows authenticated users to execute arbitra
7270 CVE-2025-63372
0.15%
35.9th 4.3 Articentgroup Zip Rar Extractor Tool 1.345.93.0 contains a directory traversal vulnerability in its
7271 CVE-2025-0498
0.15%
35.7th 9.8 A data exposure vulnerability in Rockwell Automation FactoryTalk AssetCentre allows threat actors to
7272 CVE-2025-0662
0.15%
35.8th 4.9 CVE-2025-0662 is a kernel memory leak vulnerability in FreeBSD's ktrace facility that allows unprivi
7273 CVE-2025-22608
0.15%
35.7th 6.5 Coolify versions before 4.0.0-beta.361 have an authorization flaw where any authenticated user can r
7274 CVE-2024-54142
0.15%
35.8th 9.0 This vulnerability allows cross-site scripting (XSS) attacks in Discourse AI plugin when HTML entiti
7275 CVE-2025-24427
0.15%
35.8th 6.5 CVE-2025-24427 is an improper access control vulnerability in Adobe Commerce that allows low-privile
7276 CVE-2024-57004
0.15%
35.7th 6.1 This Cross-Site Scripting (XSS) vulnerability in Roundcube Webmail allows authenticated users to upl
7277 CVE-2025-29312
0.15%
35.8th 9.1 This vulnerability in ONOS (Open Network Operating System) v2.7.0 allows attackers to trigger unexpe
7278 CVE-2025-25598
0.15%
35.8th 8.8 This vulnerability allows attackers to escalate privileges by placing a crafted executable into sche
7279 CVE-2024-53699
0.15%
35.7th 7.2 An out-of-bounds write vulnerability in QNAP operating systems could allow remote attackers with adm
7280 CVE-2024-53697
0.15%
35.7th 7.2 This CVE describes an out-of-bounds write vulnerability in QNAP operating systems that could allow r
7281 CVE-2024-53693
0.15%
35.8th 7.1 This CRLF injection vulnerability in QNAP operating systems allows attackers with user access to man
7282 CVE-2024-38638
0.15%
35.7th 7.2 An out-of-bounds write vulnerability in QNAP operating systems allows remote attackers with administ
7283 CVE-2025-22066
0.15%
35.8th 5.5 This CVE describes a NULL pointer dereference vulnerability in the Linux kernel's ASoC imx-card driv
7284 CVE-2025-30511
0.15%
35.8th 8.8 An authenticated attacker can inject malicious scripts into the plant name field, which are then sto
7285 CVE-2025-3388
0.15%
35.7th 4.3 This vulnerability allows attackers to inject malicious scripts through the username parameter durin
7286 CVE-2025-3256
0.15%
35.9th 6.3 This vulnerability in admintwo 1.0 allows attackers to bypass access controls via the email paramete
7287 CVE-2025-28132
0.15%
35.8th 4.6 A session management vulnerability in Nagios Network Analyzer allows attackers to reuse session toke
7288 CVE-2025-2906
0.15%
35.8th 6.4 The Contempo Real Estate Core WordPress plugin has a stored XSS vulnerability that allows authentica
7289 CVE-2025-31698
0.15%
35.8th 7.5 Apache Traffic Server versions 9.0.0-9.2.10 and 10.0.0-10.0.6 have an ACL bypass vulnerability when
7290 CVE-2025-33004
0.15%
35.9th 6.5 This vulnerability in IBM Planning Analytics Local allows privileged users to delete files from dire
7291 CVE-2025-41677
0.15%
35.8th 4.9 This vulnerability allows a high-privileged remote attacker to cause denial of service by exhausting
7292 CVE-2025-47999
0.15%
35.7th 6.8 A missing synchronization vulnerability in Windows Hyper-V allows an authenticated attacker on an ad
7293 CVE-2025-55673
0.15%
35.8th 4.3 This vulnerability allows guest users in Apache Superset to access database schema information throu
7294 CVE-2025-8576
0.15%
35.7th 8.8 A use-after-free vulnerability in Google Chrome's extension system allows remote attackers to potent
7295 CVE-2025-59535
0.15%
35.8th 6.5 DNN CMS versions before 10.1.0 allow attackers to load arbitrary themes via query parameters, potent
7296 CVE-2025-41719
0.15%
35.8th 8.8 A low-privileged remote attacker can corrupt the webserver user storage by sending unsupported chara
7297 CVE-2025-59790
0.15%
35.8th 5.4 CVE-2025-59790 is an improper privilege management vulnerability in Apache Kvrocks that could allow
7298 CVE-2025-12057
0.15%
35.8th 9.8 The WavePlayer WordPress plugin before version 3.8.0 contains an unauthenticated arbitrary file uplo
7299 CVE-2025-46428
0.15%
35.8th 8.8 Dell SmartFabric OS10 Software contains a command injection vulnerability that allows low-privileged
7300 CVE-2025-56385
0.15%
35.8th 9.8 This SQL injection vulnerability in WellSky Harmony's login functionality allows attackers to bypass

What is EPSS?

The Exploit Prediction Scoring System (EPSS) is a data-driven model developed by FIRST.org that estimates the probability a CVE will be exploited in the wild within the next 30 days. Unlike CVSS which measures severity, EPSS measures likelihood of exploitation — making it ideal for prioritizing which vulnerabilities to patch first.

Why EPSS matters: With thousands of CVEs published monthly, not all vulnerabilities are equally dangerous. EPSS helps security teams focus on the CVEs most likely to be actively exploited, rather than patching solely by CVSS score. A critical CVSS 9.8 vulnerability with 0.1% EPSS may be less urgent than a high CVSS 7.5 with 90% EPSS.

Prioritize by Exploit Risk

Scan your servers and see which vulnerabilities have the highest EPSS scores. Focus on what attackers are actually targeting.

Start Monitoring Free