Most Exploitable CVEs - EPSS Rankings

CVEs ranked by EPSS (Exploit Prediction Scoring System) probability. Higher scores mean a greater likelihood of exploitation in the wild within the next 30 days.

164
EPSS > 50%
156
CISA KEV Listed
35,468
CVEs with EPSS
0.7%
Avg EPSS Score
All Critical High Medium Low
Rank CVE ID EPSS Score Percentile CVSS Flags Summary
701 CVE-2023-53892
0.91%
75.3th 7.2 Blackcat CMS 1.4 contains a remote code execution vulnerability that allows authenticated administra
702 CVE-2025-29824
0.9%
75.3th 7.8 KEV This is a local privilege escalation vulnerability in the Windows Common Log File System Driver. An
703 CVE-2025-2009
0.9%
75.2th 7.2 The Newsletters plugin for WordPress has a stored XSS vulnerability in its logging functionality tha
704 CVE-2026-23864
0.9%
75.2th 7.5 Multiple denial of service vulnerabilities in React Server Components allow attackers to crash serve
705 CVE-2024-9920
0.89%
75.1th 8.8 This vulnerability allows attackers to upload malicious files with dangerous extensions (.py, .sh, .
706 CVE-2025-53416
0.89%
75.1th 7.8 This vulnerability in Delta Electronics DTN Soft allows remote code execution through deserializatio
707 CVE-2025-53415
0.89%
75.1th 7.8 This vulnerability allows remote code execution through deserialization of untrusted data in Delta E
708 CVE-2025-25243
0.89%
75th 8.6 CVE-2025-25243 is an unauthenticated arbitrary file download vulnerability in SAP Supplier Relations
709 CVE-2026-0785
0.89%
75th 8.8 CVE-2026-0785 is a command injection vulnerability in ALGO 8180 IP Audio Alerter devices that allows
710 CVE-2025-21371
0.88%
75th 8.8 This vulnerability allows remote attackers to execute arbitrary code on Windows systems by exploitin
711 CVE-2025-0185
0.88%
75th 8.8 This vulnerability in Dify Tools' Vanna module allows attackers to inject malicious queries through
712 CVE-2024-13234
0.88%
74.9th 7.5 The Product Table by WBW WordPress plugin contains an SQL injection vulnerability in the 'additional
713 CVE-2025-2240
0.88%
74.9th 7.5 CVE-2025-2240 is a memory exhaustion vulnerability in Smallrye Fault Tolerance where repeated calls
714 CVE-2025-29822
0.88%
74.9th 7.8 This vulnerability allows an unauthorized attacker to bypass a security feature in Microsoft Office
715 CVE-2025-65879
0.88%
74.8th 8.1 Warehouse Management System 1.2 contains an authenticated arbitrary file deletion vulnerability. Rem
716 CVE-2025-49744
0.87%
74.8th 7.0 A heap-based buffer overflow vulnerability in Microsoft Graphics Component allows authenticated atta
717 CVE-2022-40619
0.87%
74.8th 7.7 This vulnerability allows unauthenticated attackers on the local network to execute arbitrary comman
718 CVE-2025-21384
0.87%
74.7th 8.3 An authenticated attacker can exploit a Server-Side Request Forgery (SSRF) vulnerability in Microsof
719 CVE-2025-5391
0.87%
74.7th 8.1 The WooCommerce Purchase Orders plugin for WordPress has a vulnerability that allows authenticated u
720 CVE-2024-54024
0.87%
74.7th 7.2 This OS command injection vulnerability in Fortinet FortiIsolator allows attackers with super-admin
721 CVE-2025-15048
0.86%
74.6th 7.3 This vulnerability allows remote attackers to execute arbitrary commands on Tenda WH450 routers by i
722 CVE-2022-50795
0.86%
74.6th 7.8 CVE-2022-50795 is a conditional command injection vulnerability in SOUND4 IMPACT/FIRST/PULSE/Eco sys
723 CVE-2025-31722
0.86%
74.5th 8.8 This vulnerability allows attackers with Item/Configure permission in Jenkins to bypass sandbox prot
724 CVE-2025-27419
0.85%
74.5th 7.5 CVE-2025-27419 is a denial-of-service vulnerability in WeGIA web management software that allows una
725 CVE-2025-0953
0.85%
74.4th 7.2 This vulnerability allows unauthenticated attackers to inject malicious scripts into WordPress pages
726 CVE-2025-0918
0.85%
74.4th 7.2 The SMTP for SendGrid – YaySMTP WordPress plugin up to version 1.3.1 contains a stored cross-site
727 CVE-2025-0916
0.85%
74.4th 7.2 This vulnerability allows unauthenticated attackers to inject malicious scripts into WordPress pages
728 CVE-2024-8474
0.84%
74.3th 7.5 OpenVPN Connect versions before 3.5.0 log the configuration profile's private key in clear text with
729 CVE-2025-53475
0.84%
74.3th 8.8 This vulnerability in Advantech iView allows authenticated attackers with user-level privileges to p
730 CVE-2023-53772
0.84%
74.3th 7.5 MiniDVBLinux 5.4 contains an arbitrary file disclosure vulnerability that allows unauthenticated att
731 CVE-2025-2243
0.84%
74.3th 7.3 A server-side request forgery (SSRF) vulnerability in Bitdefender GravityZone Console allows attacke
732 CVE-2025-32709
0.84%
74.3th 7.8 KEV A null pointer dereference vulnerability in Windows Ancillary Function Driver for WinSock allows aut
733 CVE-2025-29281
0.84%
74.3th 8.8 PerfreeBlog 4.0.11 contains an arbitrary file upload vulnerability in the attach component that allo
734 CVE-2025-3161
0.84%
74.2th 8.8 A critical stack-based buffer overflow vulnerability in Tenda AC10 routers allows remote attackers t
735 CVE-2025-29811
0.84%
74.2th 7.8 This vulnerability allows an authorized attacker with local access to a Windows system to exploit im
736 CVE-2025-29967
0.83%
74.2th 8.8 A heap-based buffer overflow vulnerability in Microsoft's Remote Desktop Gateway Service allows unau
737 CVE-2025-48868
0.83%
74.1th 7.2 Horilla HRMS version 1.3.0 contains an authenticated Remote Code Execution vulnerability where privi
738 CVE-2025-68455
0.83%
74.1th 7.2 This vulnerability allows authenticated remote code execution in Craft CMS when an attacker with adm
739 CVE-2025-2449
0.83%
74.1th 8.8 This vulnerability in NI FlexLogger's usiReg component allows remote attackers to create arbitrary f
740 CVE-2024-12551
0.83%
74.1th 7.8 This vulnerability allows remote attackers to execute arbitrary code by tricking users into opening
741 CVE-2024-12547
0.83%
74.1th 8.8 This vulnerability allows remote attackers to execute arbitrary code by tricking users into opening
742 CVE-2025-34202
0.83%
74th 8.8 This vulnerability exposes Docker container networks in Vasion Print (formerly PrinterLogic) deploym
743 CVE-2025-1851
0.82%
74th 8.8 A critical stack-based buffer overflow vulnerability in Tenda AC7 routers allows remote attackers to
744 CVE-2025-21309
0.82%
74th 8.1 This vulnerability allows remote attackers to execute arbitrary code on Windows systems running Remo
745 CVE-2025-27394
0.82%
73.9th 7.2 This vulnerability allows an authenticated, highly-privileged remote attacker to execute arbitrary c
746 CVE-2025-27393
0.82%
73.9th 7.2 This vulnerability in Siemens SCALANCE LPE9403 industrial network devices allows authenticated high-
747 CVE-2025-27392
0.82%
73.9th 7.2 A vulnerability in SCALANCE LPE9403 industrial network devices allows authenticated high-privileged
748 CVE-2024-53800
0.82%
73.9th 8.1 This vulnerability allows attackers to include local files on the server through PHP's include/requi
749 CVE-2025-34225
0.81%
73.9th 8.6 This CVE describes an unauthenticated server-side request forgery (SSRF) vulnerability in Vasion Pri
750 CVE-2025-14107
0.81%
73.8th 8.8 This CVE describes a command injection vulnerability in ZSPACE Q2C NAS devices that allows remote at

What is EPSS?

The Exploit Prediction Scoring System (EPSS) is a data-driven model developed by FIRST.org that estimates the probability a CVE will be exploited in the wild within the next 30 days. Unlike CVSS which measures severity, EPSS measures likelihood of exploitation — making it ideal for prioritizing which vulnerabilities to patch first.

Why EPSS matters: With thousands of CVEs published monthly, not all vulnerabilities are equally dangerous. EPSS helps security teams focus on the CVEs most likely to be actively exploited, rather than patching solely by CVSS score. A critical CVSS 9.8 vulnerability with 0.1% EPSS may be less urgent than a high CVSS 7.5 with 90% EPSS.

Prioritize by Exploit Risk

Scan your servers and see which vulnerabilities have the highest EPSS scores. Focus on what attackers are actually targeting.

Start Monitoring Free