Most Exploitable CVEs - EPSS Rankings
CVEs ranked by EPSS (Exploit Prediction Scoring System) probability. Higher scores mean a greater likelihood of exploitation in the wild within the next 30 days.
| Rank | CVE ID | EPSS Score | Percentile | CVSS | Flags | Summary |
|---|---|---|---|---|---|---|
| 7251 | CVE-2024-6690 |
|
35.9th | 6.1 | The wccp-pro WordPress plugin before version 15.3 contains an open redirect vulnerability via the re | |
| 7252 | CVE-2023-6541 |
|
36th | 6.1 | The Allow SVG WordPress plugin before version 1.2.0 fails to sanitize uploaded SVG files, allowing u | |
| 7253 | CVE-2025-22460 |
|
35.9th | 7.8 | This vulnerability allows local authenticated attackers to escalate privileges in Ivanti Cloud Servi | |
| 7254 | CVE-2025-31239 |
|
35.9th | 4.3 | A use-after-free vulnerability in Apple operating systems allows parsing malicious files to cause un | |
| 7255 | CVE-2025-4329 |
|
35.9th | 4.3 | This vulnerability in 74CMS allows attackers to perform path traversal attacks by manipulating the ' | |
| 7256 | CVE-2025-5878 |
|
35.9th | 7.3 | This vulnerability in ESAPI esapi-java-legacy allows SQL injection attacks through the Encoder.encod | |
| 7257 | CVE-2025-32877 |
|
35.9th | 9.8 | COROS PACE 3 smartwatches through firmware version 3.0808.0 incorrectly identify themselves as devic | |
| 7258 | CVE-2025-41675 |
|
35.9th | 7.2 | This vulnerability allows a high-privileged remote attacker to execute arbitrary operating system co | |
| 7259 | CVE-2025-41673 |
|
35.9th | 7.2 | This vulnerability allows authenticated high-privileged remote attackers to execute arbitrary operat | |
| 7260 | CVE-2025-37102 |
|
36th | 7.2 | An authenticated command injection vulnerability in HPE Networking Instant On Access Points allows a | |
| 7261 | CVE-2025-4779 |
|
36th | 6.1 | This stored XSS vulnerability in lunary-ai/lunary allows unauthenticated attackers to inject malicio | |
| 7262 | CVE-2025-30261 |
|
36th | 6.5 | This vulnerability in Qsync Central allows authenticated remote attackers to perform resource exhaus | |
| 7263 | CVE-2025-29900 |
|
36th | 6.5 | This vulnerability in QNAP File Station 5 allows authenticated attackers to exhaust system resources | |
| 7264 | CVE-2025-29898 |
|
36th | 6.5 | An uncontrolled resource consumption vulnerability in Qsync Central allows authenticated remote atta | |
| 7265 | CVE-2025-10472 |
|
35.9th | 5.3 | A path traversal vulnerability in MoneyPrinterTurbo allows attackers to access arbitrary files on th | |
| 7266 | CVE-2025-64066 |
|
35.9th | 8.6 | Primakon Pi Portal 1.0.18 has a broken access control vulnerability in its user registration endpoin | |
| 7267 | CVE-2025-46427 |
|
35.9th | 8.8 | Dell SmartFabric OS10 Software versions before 10.6.1.0 contain a command injection vulnerability th | |
| 7268 | CVE-2025-15106 |
|
35.9th | 6.3 | CVE-2025-15106 is an improper authorization vulnerability in getmaxun maxun's authentication endpoin | |
| 7269 | CVE-2025-13774 |
|
36th | 8.8 | An SQL injection vulnerability in Progress Flowmon ADS allows authenticated users to execute arbitra | |
| 7270 | CVE-2025-63372 |
|
35.9th | 4.3 | Articentgroup Zip Rar Extractor Tool 1.345.93.0 contains a directory traversal vulnerability in its | |
| 7271 | CVE-2025-0498 |
|
35.7th | 9.8 | A data exposure vulnerability in Rockwell Automation FactoryTalk AssetCentre allows threat actors to | |
| 7272 | CVE-2025-0662 |
|
35.8th | 4.9 | CVE-2025-0662 is a kernel memory leak vulnerability in FreeBSD's ktrace facility that allows unprivi | |
| 7273 | CVE-2025-22608 |
|
35.7th | 6.5 | Coolify versions before 4.0.0-beta.361 have an authorization flaw where any authenticated user can r | |
| 7274 | CVE-2024-54142 |
|
35.8th | 9.0 | This vulnerability allows cross-site scripting (XSS) attacks in Discourse AI plugin when HTML entiti | |
| 7275 | CVE-2025-24427 |
|
35.8th | 6.5 | CVE-2025-24427 is an improper access control vulnerability in Adobe Commerce that allows low-privile | |
| 7276 | CVE-2024-57004 |
|
35.7th | 6.1 | This Cross-Site Scripting (XSS) vulnerability in Roundcube Webmail allows authenticated users to upl | |
| 7277 | CVE-2025-29312 |
|
35.8th | 9.1 | This vulnerability in ONOS (Open Network Operating System) v2.7.0 allows attackers to trigger unexpe | |
| 7278 | CVE-2025-25598 |
|
35.8th | 8.8 | This vulnerability allows attackers to escalate privileges by placing a crafted executable into sche | |
| 7279 | CVE-2024-53699 |
|
35.7th | 7.2 | An out-of-bounds write vulnerability in QNAP operating systems could allow remote attackers with adm | |
| 7280 | CVE-2024-53697 |
|
35.7th | 7.2 | This CVE describes an out-of-bounds write vulnerability in QNAP operating systems that could allow r | |
| 7281 | CVE-2024-53693 |
|
35.8th | 7.1 | This CRLF injection vulnerability in QNAP operating systems allows attackers with user access to man | |
| 7282 | CVE-2024-38638 |
|
35.7th | 7.2 | An out-of-bounds write vulnerability in QNAP operating systems allows remote attackers with administ | |
| 7283 | CVE-2025-22066 |
|
35.8th | 5.5 | This CVE describes a NULL pointer dereference vulnerability in the Linux kernel's ASoC imx-card driv | |
| 7284 | CVE-2025-30511 |
|
35.8th | 8.8 | An authenticated attacker can inject malicious scripts into the plant name field, which are then sto | |
| 7285 | CVE-2025-3388 |
|
35.7th | 4.3 | This vulnerability allows attackers to inject malicious scripts through the username parameter durin | |
| 7286 | CVE-2025-3256 |
|
35.9th | 6.3 | This vulnerability in admintwo 1.0 allows attackers to bypass access controls via the email paramete | |
| 7287 | CVE-2025-28132 |
|
35.8th | 4.6 | A session management vulnerability in Nagios Network Analyzer allows attackers to reuse session toke | |
| 7288 | CVE-2025-2906 |
|
35.8th | 6.4 | The Contempo Real Estate Core WordPress plugin has a stored XSS vulnerability that allows authentica | |
| 7289 | CVE-2025-31698 |
|
35.8th | 7.5 | Apache Traffic Server versions 9.0.0-9.2.10 and 10.0.0-10.0.6 have an ACL bypass vulnerability when | |
| 7290 | CVE-2025-33004 |
|
35.9th | 6.5 | This vulnerability in IBM Planning Analytics Local allows privileged users to delete files from dire | |
| 7291 | CVE-2025-41677 |
|
35.8th | 4.9 | This vulnerability allows a high-privileged remote attacker to cause denial of service by exhausting | |
| 7292 | CVE-2025-47999 |
|
35.7th | 6.8 | A missing synchronization vulnerability in Windows Hyper-V allows an authenticated attacker on an ad | |
| 7293 | CVE-2025-55673 |
|
35.8th | 4.3 | This vulnerability allows guest users in Apache Superset to access database schema information throu | |
| 7294 | CVE-2025-8576 |
|
35.7th | 8.8 | A use-after-free vulnerability in Google Chrome's extension system allows remote attackers to potent | |
| 7295 | CVE-2025-59535 |
|
35.8th | 6.5 | DNN CMS versions before 10.1.0 allow attackers to load arbitrary themes via query parameters, potent | |
| 7296 | CVE-2025-41719 |
|
35.8th | 8.8 | A low-privileged remote attacker can corrupt the webserver user storage by sending unsupported chara | |
| 7297 | CVE-2025-59790 |
|
35.8th | 5.4 | CVE-2025-59790 is an improper privilege management vulnerability in Apache Kvrocks that could allow | |
| 7298 | CVE-2025-12057 |
|
35.8th | 9.8 | The WavePlayer WordPress plugin before version 3.8.0 contains an unauthenticated arbitrary file uplo | |
| 7299 | CVE-2025-46428 |
|
35.8th | 8.8 | Dell SmartFabric OS10 Software contains a command injection vulnerability that allows low-privileged | |
| 7300 | CVE-2025-56385 |
|
35.8th | 9.8 | This SQL injection vulnerability in WellSky Harmony's login functionality allows attackers to bypass |
What is EPSS?
The Exploit Prediction Scoring System (EPSS) is a data-driven model developed by FIRST.org that estimates the probability a CVE will be exploited in the wild within the next 30 days. Unlike CVSS which measures severity, EPSS measures likelihood of exploitation — making it ideal for prioritizing which vulnerabilities to patch first.
Why EPSS matters: With thousands of CVEs published monthly, not all vulnerabilities are equally dangerous. EPSS helps security teams focus on the CVEs most likely to be actively exploited, rather than patching solely by CVSS score. A critical CVSS 9.8 vulnerability with 0.1% EPSS may be less urgent than a high CVSS 7.5 with 90% EPSS.
Prioritize by Exploit Risk
Scan your servers and see which vulnerabilities have the highest EPSS scores. Focus on what attackers are actually targeting.
Start Monitoring Free