Most Exploitable CVEs - EPSS Rankings

CVEs ranked by EPSS (Exploit Prediction Scoring System) probability. Higher scores mean a greater likelihood of exploitation in the wild within the next 30 days.

164
EPSS > 50%
156
CISA KEV Listed
35,468
CVEs with EPSS
0.7%
Avg EPSS Score
All Critical High Medium Low
Rank CVE ID EPSS Score Percentile CVSS Flags Summary
7301 CVE-2024-57916
0.05%
13.8th 5.5 A vulnerability in the Linux kernel's microchip PCI1XXXX GPIO driver causes kernel panics during int
7302 CVE-2025-22168
0.05%
14th 4.3 Jira Align has an authorization vulnerability where low-privilege users can access endpoints they sh
7303 CVE-2025-22169
0.05%
14th 5.4 Jira Align has an authorization vulnerability where low-privilege users can access endpoints they sh
7304 CVE-2025-71005
0.05%
13.8th 6.5 A floating point exception vulnerability in OneFlow's oneflow.view component allows attackers to cra
7305 CVE-2025-22170
0.05%
14th 4.3 Jira Align has an authorization bypass vulnerability where low-privilege users can perform actions t
7306 CVE-2025-71006
0.05%
13.8th 6.5 A floating point exception vulnerability in OneFlow's reshape component allows attackers to crash th
7307 CVE-2025-11668
0.05%
13.9th 4.7 This SQL injection vulnerability in code-projects Automated Voting System 1.0 allows attackers to ma
7308 CVE-2025-22172
0.05%
14th 4.3 Jira Align has an authorization vulnerability where low-privilege users can access endpoints they sh
7309 CVE-2025-22173
0.05%
14th 4.3 Jira Align has an authorization vulnerability where low-privilege users can access endpoints they sh
7310 CVE-2025-22174
0.05%
14th 4.3 Jira Align has an authorization vulnerability where low-privilege users can access endpoints they sh
7311 CVE-2025-22175
0.05%
14th 5.4 Jira Align has an authorization vulnerability where low-privilege users can access endpoints they sh
7312 CVE-2025-43247
0.05%
14th 5.5 A macOS permissions vulnerability allows malicious applications with root privileges to modify syste
7313 CVE-2025-14842
0.05%
13.8th 6.1 The Drag and Drop Multiple File Upload plugin for Contact Form 7 in WordPress allows unauthenticated
7314 CVE-2025-22176
0.05%
14th 4.3 Jira Align has an authorization vulnerability where low-privilege users can access endpoints they sh
7315 CVE-2025-22177
0.05%
14th 4.3 Jira Align has an authorization vulnerability where low-privilege users can access endpoints they sh
7316 CVE-2025-41076
0.05%
13.9th 6.5 This vulnerability allows external users to trigger a 500 error in LimeSurvey by sending malformed s
7317 CVE-2025-22178
0.05%
14th 4.3 Jira Align has an authorization vulnerability where low-privilege users can access endpoints they sh
7318 CVE-2025-65230
0.05%
13.8th 5.4 Barix Instreamer versions 04.06 and 04.05 contain a stored cross-site scripting vulnerability in the
7319 CVE-2025-58749
0.05%
14.2th 5.3 This vulnerability in WebAssembly Micro Runtime (WAMR) causes runtime hangs or crashes when executin
7320 CVE-2026-0808
0.05%
14.1th 5.3 The Spin Wheel WordPress plugin allows unauthenticated attackers to manipulate prize selection by mo
7321 CVE-2025-54967
0.05%
14th 6.5 This vulnerability in BAE SOCET GXP allows XML External Entity (XXE) attacks through malicious files
7322 CVE-2024-51456
0.05%
13.9th 5.9 This vulnerability in IBM Robotic Process Automation allows remote attackers to potentially obtain s
7323 CVE-2025-55098
0.05%
13.9th 6.1 This vulnerability allows an attacker to trigger an out-of-bounds read in USBX's audio device parsin
7324 CVE-2024-58017
0.05%
13.8th 5.5 This CVE addresses a signed integer overflow vulnerability in the Linux kernel's printk subsystem wh
7325 CVE-2025-55099
0.05%
13.9th 6.1 This vulnerability allows an attacker to trigger an out-of-bounds read in USBX's audio host class im
7326 CVE-2024-5440
0.05%
13.8th 5.4 The If-So Dynamic Content Personalization WordPress plugin before version 1.8.0.3 contains a stored
7327 CVE-2025-46225
0.05%
13.8th 6.5 This DOM-based Cross-Site Scripting (XSS) vulnerability in the Post in page for Elementor WordPress
7328 CVE-2026-24829
0.05%
14.1th 6.5 CVE-2026-24829 is a heap-based buffer overflow vulnerability in Is-Daouda's is-Engine software that
7329 CVE-2025-46227
0.05%
13.8th 6.5 This stored cross-site scripting (XSS) vulnerability in the Custom Related Posts WordPress plugin al
7330 CVE-2025-46235
0.05%
13.8th 6.5 This stored cross-site scripting (XSS) vulnerability in the SKT Blocks WordPress plugin allows attac
7331 CVE-2025-46237
0.05%
13.8th 6.5 This stored cross-site scripting (XSS) vulnerability in the Link Library WordPress plugin allows att
7332 CVE-2025-55734
0.05%
13.9th 6.5 This CVE describes an authorization bypass vulnerability in flaskBlog where admin role checks are on
7333 CVE-2025-47703
0.05%
14.1th 6.1 This Cross-Site Scripting (XSS) vulnerability in Drupal's COOKiES Consent Management module allows a
7334 CVE-2025-46239
0.05%
13.8th 6.5 This stored cross-site scripting (XSS) vulnerability in the Theme Switcha WordPress plugin allows at
7335 CVE-2025-14512
0.05%
14.2th 6.5 This vulnerability in GLib's GIO component allows heap buffer overflow and denial-of-service via int
7336 CVE-2025-47705
0.05%
14.1th 6.1 This vulnerability allows attackers to inject malicious scripts into web pages generated by Drupal I
7337 CVE-2024-22347
0.05%
13.9th 5.9 This vulnerability in IBM DevOps Velocity and UrbanCode Velocity uses weak cryptographic algorithms
7338 CVE-2025-59687
0.05%
13.9th 4.3 IMPAQTR Aurora versions before 1.36 contain an Insecure Direct Object Reference (IDOR) vulnerability
7339 CVE-2025-58962
0.05%
13.9th 6.4 This Server-Side Request Forgery (SSRF) vulnerability in the Publitio WordPress plugin allows attack
7340 CVE-2025-7374
0.05%
13.9th 5.4 The WP JobHunt plugin for WordPress (used by JobCareer theme) has an authorization bypass vulnerabil
7341 CVE-2025-58968
0.05%
13.9th 5.0 This CVE describes a Missing Authorization vulnerability in the MaxiBlocks WordPress plugin that all
7342 CVE-2025-62253
0.05%
13.8th 6.1 This open redirect vulnerability in Liferay Portal and DXP allows attackers to redirect authenticate
7343 CVE-2025-46253
0.05%
13.8th 6.5 This stored cross-site scripting (XSS) vulnerability in the GutenKit WordPress plugin allows attacke
7344 CVE-2025-11358
0.05%
14.2th 6.3 CVE-2025-11358 is a SQL injection vulnerability in Simple Banking System 1.0 that allows remote atta
7345 CVE-2025-15098
0.05%
14.2th 6.3 This CVE describes a server-side request forgery (SSRF) vulnerability in YunaiV yudao-cloud's Busine
7346 CVE-2025-43503
0.05%
13.8th 4.3 This CVE describes a user interface spoofing vulnerability in Apple operating systems and Safari bro
7347 CVE-2026-22028
0.05%
13.8th 6.1 A regression in Preact versions 10.26.5 through 10.28.1 weakens JSON serialization protection, allow
7348 CVE-2025-62091
0.05%
13.9th 5.4 This CVE describes a Missing Authorization vulnerability in the Vollstart Serial Codes Generator and
7349 CVE-2025-10457
0.05%
14th 4.3 This vulnerability allows attackers to spoof BLE connection responses to devices running vulnerable
7350 CVE-2025-23175
0.05%
14th 6.1 CVE-2025-23175 is a cross-site scripting (XSS) vulnerability that allows attackers to inject malicio

What is EPSS?

The Exploit Prediction Scoring System (EPSS) is a data-driven model developed by FIRST.org that estimates the probability a CVE will be exploited in the wild within the next 30 days. Unlike CVSS which measures severity, EPSS measures likelihood of exploitation — making it ideal for prioritizing which vulnerabilities to patch first.

Why EPSS matters: With thousands of CVEs published monthly, not all vulnerabilities are equally dangerous. EPSS helps security teams focus on the CVEs most likely to be actively exploited, rather than patching solely by CVSS score. A critical CVSS 9.8 vulnerability with 0.1% EPSS may be less urgent than a high CVSS 7.5 with 90% EPSS.

Prioritize by Exploit Risk

Scan your servers and see which vulnerabilities have the highest EPSS scores. Focus on what attackers are actually targeting.

Start Monitoring Free