Most Exploitable CVEs - EPSS Rankings
CVEs ranked by EPSS (Exploit Prediction Scoring System) probability. Higher scores mean a greater likelihood of exploitation in the wild within the next 30 days.
| Rank | CVE ID | EPSS Score | Percentile | CVSS | Flags | Summary |
|---|---|---|---|---|---|---|
| 7301 | CVE-2024-57916 |
|
13.8th | 5.5 | A vulnerability in the Linux kernel's microchip PCI1XXXX GPIO driver causes kernel panics during int | |
| 7302 | CVE-2025-22168 |
|
14th | 4.3 | Jira Align has an authorization vulnerability where low-privilege users can access endpoints they sh | |
| 7303 | CVE-2025-22169 |
|
14th | 5.4 | Jira Align has an authorization vulnerability where low-privilege users can access endpoints they sh | |
| 7304 | CVE-2025-71005 |
|
13.8th | 6.5 | A floating point exception vulnerability in OneFlow's oneflow.view component allows attackers to cra | |
| 7305 | CVE-2025-22170 |
|
14th | 4.3 | Jira Align has an authorization bypass vulnerability where low-privilege users can perform actions t | |
| 7306 | CVE-2025-71006 |
|
13.8th | 6.5 | A floating point exception vulnerability in OneFlow's reshape component allows attackers to crash th | |
| 7307 | CVE-2025-11668 |
|
13.9th | 4.7 | This SQL injection vulnerability in code-projects Automated Voting System 1.0 allows attackers to ma | |
| 7308 | CVE-2025-22172 |
|
14th | 4.3 | Jira Align has an authorization vulnerability where low-privilege users can access endpoints they sh | |
| 7309 | CVE-2025-22173 |
|
14th | 4.3 | Jira Align has an authorization vulnerability where low-privilege users can access endpoints they sh | |
| 7310 | CVE-2025-22174 |
|
14th | 4.3 | Jira Align has an authorization vulnerability where low-privilege users can access endpoints they sh | |
| 7311 | CVE-2025-22175 |
|
14th | 5.4 | Jira Align has an authorization vulnerability where low-privilege users can access endpoints they sh | |
| 7312 | CVE-2025-43247 |
|
14th | 5.5 | A macOS permissions vulnerability allows malicious applications with root privileges to modify syste | |
| 7313 | CVE-2025-14842 |
|
13.8th | 6.1 | The Drag and Drop Multiple File Upload plugin for Contact Form 7 in WordPress allows unauthenticated | |
| 7314 | CVE-2025-22176 |
|
14th | 4.3 | Jira Align has an authorization vulnerability where low-privilege users can access endpoints they sh | |
| 7315 | CVE-2025-22177 |
|
14th | 4.3 | Jira Align has an authorization vulnerability where low-privilege users can access endpoints they sh | |
| 7316 | CVE-2025-41076 |
|
13.9th | 6.5 | This vulnerability allows external users to trigger a 500 error in LimeSurvey by sending malformed s | |
| 7317 | CVE-2025-22178 |
|
14th | 4.3 | Jira Align has an authorization vulnerability where low-privilege users can access endpoints they sh | |
| 7318 | CVE-2025-65230 |
|
13.8th | 5.4 | Barix Instreamer versions 04.06 and 04.05 contain a stored cross-site scripting vulnerability in the | |
| 7319 | CVE-2025-58749 |
|
14.2th | 5.3 | This vulnerability in WebAssembly Micro Runtime (WAMR) causes runtime hangs or crashes when executin | |
| 7320 | CVE-2026-0808 |
|
14.1th | 5.3 | The Spin Wheel WordPress plugin allows unauthenticated attackers to manipulate prize selection by mo | |
| 7321 | CVE-2025-54967 |
|
14th | 6.5 | This vulnerability in BAE SOCET GXP allows XML External Entity (XXE) attacks through malicious files | |
| 7322 | CVE-2024-51456 |
|
13.9th | 5.9 | This vulnerability in IBM Robotic Process Automation allows remote attackers to potentially obtain s | |
| 7323 | CVE-2025-55098 |
|
13.9th | 6.1 | This vulnerability allows an attacker to trigger an out-of-bounds read in USBX's audio device parsin | |
| 7324 | CVE-2024-58017 |
|
13.8th | 5.5 | This CVE addresses a signed integer overflow vulnerability in the Linux kernel's printk subsystem wh | |
| 7325 | CVE-2025-55099 |
|
13.9th | 6.1 | This vulnerability allows an attacker to trigger an out-of-bounds read in USBX's audio host class im | |
| 7326 | CVE-2024-5440 |
|
13.8th | 5.4 | The If-So Dynamic Content Personalization WordPress plugin before version 1.8.0.3 contains a stored | |
| 7327 | CVE-2025-46225 |
|
13.8th | 6.5 | This DOM-based Cross-Site Scripting (XSS) vulnerability in the Post in page for Elementor WordPress | |
| 7328 | CVE-2026-24829 |
|
14.1th | 6.5 | CVE-2026-24829 is a heap-based buffer overflow vulnerability in Is-Daouda's is-Engine software that | |
| 7329 | CVE-2025-46227 |
|
13.8th | 6.5 | This stored cross-site scripting (XSS) vulnerability in the Custom Related Posts WordPress plugin al | |
| 7330 | CVE-2025-46235 |
|
13.8th | 6.5 | This stored cross-site scripting (XSS) vulnerability in the SKT Blocks WordPress plugin allows attac | |
| 7331 | CVE-2025-46237 |
|
13.8th | 6.5 | This stored cross-site scripting (XSS) vulnerability in the Link Library WordPress plugin allows att | |
| 7332 | CVE-2025-55734 |
|
13.9th | 6.5 | This CVE describes an authorization bypass vulnerability in flaskBlog where admin role checks are on | |
| 7333 | CVE-2025-47703 |
|
14.1th | 6.1 | This Cross-Site Scripting (XSS) vulnerability in Drupal's COOKiES Consent Management module allows a | |
| 7334 | CVE-2025-46239 |
|
13.8th | 6.5 | This stored cross-site scripting (XSS) vulnerability in the Theme Switcha WordPress plugin allows at | |
| 7335 | CVE-2025-14512 |
|
14.2th | 6.5 | This vulnerability in GLib's GIO component allows heap buffer overflow and denial-of-service via int | |
| 7336 | CVE-2025-47705 |
|
14.1th | 6.1 | This vulnerability allows attackers to inject malicious scripts into web pages generated by Drupal I | |
| 7337 | CVE-2024-22347 |
|
13.9th | 5.9 | This vulnerability in IBM DevOps Velocity and UrbanCode Velocity uses weak cryptographic algorithms | |
| 7338 | CVE-2025-59687 |
|
13.9th | 4.3 | IMPAQTR Aurora versions before 1.36 contain an Insecure Direct Object Reference (IDOR) vulnerability | |
| 7339 | CVE-2025-58962 |
|
13.9th | 6.4 | This Server-Side Request Forgery (SSRF) vulnerability in the Publitio WordPress plugin allows attack | |
| 7340 | CVE-2025-7374 |
|
13.9th | 5.4 | The WP JobHunt plugin for WordPress (used by JobCareer theme) has an authorization bypass vulnerabil | |
| 7341 | CVE-2025-58968 |
|
13.9th | 5.0 | This CVE describes a Missing Authorization vulnerability in the MaxiBlocks WordPress plugin that all | |
| 7342 | CVE-2025-62253 |
|
13.8th | 6.1 | This open redirect vulnerability in Liferay Portal and DXP allows attackers to redirect authenticate | |
| 7343 | CVE-2025-46253 |
|
13.8th | 6.5 | This stored cross-site scripting (XSS) vulnerability in the GutenKit WordPress plugin allows attacke | |
| 7344 | CVE-2025-11358 |
|
14.2th | 6.3 | CVE-2025-11358 is a SQL injection vulnerability in Simple Banking System 1.0 that allows remote atta | |
| 7345 | CVE-2025-15098 |
|
14.2th | 6.3 | This CVE describes a server-side request forgery (SSRF) vulnerability in YunaiV yudao-cloud's Busine | |
| 7346 | CVE-2025-43503 |
|
13.8th | 4.3 | This CVE describes a user interface spoofing vulnerability in Apple operating systems and Safari bro | |
| 7347 | CVE-2026-22028 |
|
13.8th | 6.1 | A regression in Preact versions 10.26.5 through 10.28.1 weakens JSON serialization protection, allow | |
| 7348 | CVE-2025-62091 |
|
13.9th | 5.4 | This CVE describes a Missing Authorization vulnerability in the Vollstart Serial Codes Generator and | |
| 7349 | CVE-2025-10457 |
|
14th | 4.3 | This vulnerability allows attackers to spoof BLE connection responses to devices running vulnerable | |
| 7350 | CVE-2025-23175 |
|
14th | 6.1 | CVE-2025-23175 is a cross-site scripting (XSS) vulnerability that allows attackers to inject malicio |
What is EPSS?
The Exploit Prediction Scoring System (EPSS) is a data-driven model developed by FIRST.org that estimates the probability a CVE will be exploited in the wild within the next 30 days. Unlike CVSS which measures severity, EPSS measures likelihood of exploitation — making it ideal for prioritizing which vulnerabilities to patch first.
Why EPSS matters: With thousands of CVEs published monthly, not all vulnerabilities are equally dangerous. EPSS helps security teams focus on the CVEs most likely to be actively exploited, rather than patching solely by CVSS score. A critical CVSS 9.8 vulnerability with 0.1% EPSS may be less urgent than a high CVSS 7.5 with 90% EPSS.
Prioritize by Exploit Risk
Scan your servers and see which vulnerabilities have the highest EPSS scores. Focus on what attackers are actually targeting.
Start Monitoring Free