Most Exploitable CVEs - EPSS Rankings
CVEs ranked by EPSS (Exploit Prediction Scoring System) probability. Higher scores mean a greater likelihood of exploitation in the wild within the next 30 days.
| Rank | CVE ID | EPSS Score | Percentile | CVSS | Flags | Summary |
|---|---|---|---|---|---|---|
| 7351 | CVE-2025-62098 |
|
13.9th | 5.4 | This CVE describes a Missing Authorization vulnerability in the Totalsoft Portfolio Gallery WordPres | |
| 7352 | CVE-2025-64084 |
|
14.1th | 5.4 | An authenticated SQL injection vulnerability in Cloudlog 2.7.5 and earlier allows authenticated atta | |
| 7353 | CVE-2025-6766 |
|
13.9th | 6.3 | This critical SQL injection vulnerability in sfturing hosp_order allows remote attackers to execute | |
| 7354 | CVE-2025-62108 |
|
13.9th | 5.4 | This CVE describes a Missing Authorization vulnerability in the SaifuMak Add Custom Codes WordPress | |
| 7355 | CVE-2025-6135 |
|
13.9th | 6.3 | This critical SQL injection vulnerability in Projectworlds Life Insurance Management System 1.0 allo | |
| 7356 | CVE-2025-21767 |
|
14.1th | 5.5 | A race condition vulnerability in the Linux kernel's clocksource subsystem where get_random_u32() is | |
| 7357 | CVE-2025-64070 |
|
13.8th | 5.4 | This vulnerability allows attackers to inject malicious scripts into the Add New Subject Description | |
| 7358 | CVE-2025-62888 |
|
13.9th | 5.4 | This CVE describes a Missing Authorization vulnerability in the WP Attachments WordPress plugin that | |
| 7359 | CVE-2025-55625 |
|
13.8th | 6.3 | An open redirect vulnerability in Reolink firmware allows attackers to craft URLs that redirect user | |
| 7360 | CVE-2025-52982 |
|
14.2th | 5.9 | An unauthenticated network attacker can cause a denial-of-service by sending a specific sequence of | |
| 7361 | CVE-2025-27587 |
|
13.9th | 5.3 | OpenSSL on PowerPC systems is vulnerable to a Minerva side-channel attack that allows extraction of | |
| 7362 | CVE-2025-40885 |
|
13.8th | 5.3 | A SQL injection vulnerability in the Smart Polling functionality allows authenticated users with lim | |
| 7363 | CVE-2025-62524 |
|
13.9th | 5.3 | PILOS (Platform for Interactive Live-Online Seminars) before version 4.8.0 exposes the PHP version v | |
| 7364 | CVE-2025-66361 |
|
13.9th | 6.5 | Logpoint versions before 7.7.0 expose sensitive information in system processes during high CPU load | |
| 7365 | CVE-2025-40888 |
|
13.8th | 5.3 | An authenticated SQL injection vulnerability in CLI functionality allows limited-privilege users to | |
| 7366 | CVE-2025-46011 |
|
13.8th | 6.5 | Listmonk v4.1.0 contains a SQL injection vulnerability in the QuerySubscribers function that allows | |
| 7367 | CVE-2025-14982 |
|
13.9th | 4.3 | The Booking Calendar plugin for WordPress has a missing authorization vulnerability that allows auth | |
| 7368 | CVE-2025-53059 |
|
14.1th | 4.9 | This vulnerability in Oracle PeopleSoft Enterprise PeopleTools allows high-privileged attackers with | |
| 7369 | CVE-2025-37728 |
|
13.9th | 5.4 | This vulnerability allows a malicious user with access to a Kibana space to create a Crowdstrike con | |
| 7370 | CVE-2025-50949 |
|
14.1th | 6.5 | FontForge v20230101 contains a memory leak in the DlgCreate8 component that allows attackers to caus | |
| 7371 | CVE-2024-8854 |
|
13.8th | 5.4 | The Polls CP WordPress plugin before version 1.0.77 contains a stored cross-site scripting (XSS) vul | |
| 7372 | CVE-2021-47702 |
|
14.1th | 4.3 | OpenBMCS 2.4 contains a CSRF vulnerability in the sendFeedback.php endpoint that allows attackers to | |
| 7373 | CVE-2025-62132 |
|
13.9th | 4.3 | This CVE describes a Missing Authorization vulnerability in the Strategy11 Team Tasty Recipes Lite W | |
| 7374 | CVE-2025-30000 |
|
13.9th | 6.7 | A privilege escalation vulnerability in Siemens License Server allows low-privileged users to gain h | |
| 7375 | CVE-2024-9599 |
|
13.8th | 5.4 | The Popup Box WordPress plugin before version 4.7.8 contains a stored cross-site scripting (XSS) vul | |
| 7376 | CVE-2026-22490 |
|
13.9th | 5.4 | This CVE describes a Missing Authorization vulnerability in the LPagery WordPress plugin that allows | |
| 7377 | CVE-2026-22492 |
|
13.9th | 4.3 | This CVE describes a Missing Authorization vulnerability in the Nawawi Jamili Docket Cache WordPress | |
| 7378 | CVE-2024-9662 |
|
13.8th | 5.4 | The CYAN Backup WordPress plugin before version 2.5.3 contains a stored cross-site scripting (XSS) v | |
| 7379 | CVE-2026-22517 |
|
13.9th | 5.4 | This CVE describes a Missing Authorization vulnerability in the GA4WP: Google Analytics for WordPres | |
| 7380 | CVE-2024-51451 |
|
13.9th | 6.5 | IBM Concert versions 1.0.0 through 2.1.0 are vulnerable to HTTP header injection due to improper val | |
| 7381 | CVE-2026-21696 |
|
13.9th | 6.5 | This vulnerability allows low-privileged users to trigger a database flood in Pterodactyl Panel by e | |
| 7382 | CVE-2025-12976 |
|
14.2th | 6.4 | This vulnerability allows authenticated WordPress users with contributor-level access or higher to i | |
| 7383 | CVE-2024-45832 |
|
14.1th | 4.3 | This vulnerability involves hard-coded credentials embedded in the application binary that are used | |
| 7384 | CVE-2025-41091 |
|
13.9th | 4.3 | This CVE describes an Insecure Direct Object Reference (IDOR) vulnerability in BOLD Workplanner that | |
| 7385 | CVE-2025-41092 |
|
13.9th | 4.3 | This IDOR vulnerability in BOLD Workplanner allows authenticated users to access time records detail | |
| 7386 | CVE-2025-41093 |
|
13.9th | 4.3 | An Insecure Direct Object Reference (IDOR) vulnerability in BOLD Workplanner allows authenticated us | |
| 7387 | CVE-2025-41094 |
|
13.9th | 4.3 | This CVE describes an Insecure Direct Object Reference (IDOR) vulnerability in BOLD Workplanner soft | |
| 7388 | CVE-2025-41095 |
|
13.9th | 4.3 | This CVE describes an Insecure Direct Object Reference (IDOR) vulnerability in BOLD Workplanner soft | |
| 7389 | CVE-2025-1454 |
|
13.8th | 5.4 | The Ninja Pages WordPress plugin through version 1.4.2 contains a stored cross-site scripting (XSS) | |
| 7390 | CVE-2025-62288 |
|
14.1th | 4.9 | This vulnerability in Oracle Health Sciences Data Management Workbench allows authenticated high-pri | |
| 7391 | CVE-2025-41096 |
|
13.9th | 4.3 | This CVE describes an Insecure Direct Object Reference (IDOR) vulnerability in BOLD Workplanner soft | |
| 7392 | CVE-2025-25250 |
|
14th | 4.3 | This vulnerability allows authenticated SSL-VPN users to access full SSL-VPN configuration settings | |
| 7393 | CVE-2025-41097 |
|
13.9th | 4.3 | This CVE describes an Insecure Direct Object Reference (IDOR) vulnerability in BOLD Workplanner soft | |
| 7394 | CVE-2024-28780 |
|
13.9th | 5.9 | IBM Cognos Controller and IBM Controller Rich Client use weak cryptographic algorithms that could al | |
| 7395 | CVE-2025-30974 |
|
14th | 4.3 | This CVE describes a missing authorization vulnerability in the Post Grid Master WordPress plugin th | |
| 7396 | CVE-2025-62960 |
|
13.9th | 5.4 | This CVE describes a missing authorization vulnerability in the Sparkle WP Construction Light WordPr | |
| 7397 | CVE-2024-13873 |
|
14th | 4.3 | This vulnerability allows authenticated WordPress users with Subscriber-level access or higher to de | |
| 7398 | CVE-2025-62961 |
|
13.9th | 5.4 | This CVE describes a missing authorization vulnerability in the Sparkle FSE WordPress theme that all | |
| 7399 | CVE-2025-47786 |
|
13.8th | 4.8 | Emlog 2.5.13 has a stored XSS vulnerability where any registered user can inject malicious JavaScrip | |
| 7400 | CVE-2025-20656 |
|
14th | 6.8 | This vulnerability in MediaTek DA software allows local attackers with physical access to escalate p |
What is EPSS?
The Exploit Prediction Scoring System (EPSS) is a data-driven model developed by FIRST.org that estimates the probability a CVE will be exploited in the wild within the next 30 days. Unlike CVSS which measures severity, EPSS measures likelihood of exploitation — making it ideal for prioritizing which vulnerabilities to patch first.
Why EPSS matters: With thousands of CVEs published monthly, not all vulnerabilities are equally dangerous. EPSS helps security teams focus on the CVEs most likely to be actively exploited, rather than patching solely by CVSS score. A critical CVSS 9.8 vulnerability with 0.1% EPSS may be less urgent than a high CVSS 7.5 with 90% EPSS.
Prioritize by Exploit Risk
Scan your servers and see which vulnerabilities have the highest EPSS scores. Focus on what attackers are actually targeting.
Start Monitoring Free