Most Exploitable CVEs - EPSS Rankings
CVEs ranked by EPSS (Exploit Prediction Scoring System) probability. Higher scores mean a greater likelihood of exploitation in the wild within the next 30 days.
| Rank | CVE ID | EPSS Score | Percentile | CVSS | Flags | Summary |
|---|---|---|---|---|---|---|
| 701 | CVE-2023-53892 |
|
75.3th | 7.2 | Blackcat CMS 1.4 contains a remote code execution vulnerability that allows authenticated administra | |
| 702 | CVE-2025-29824 |
|
75.3th | 7.8 | KEV | This is a local privilege escalation vulnerability in the Windows Common Log File System Driver. An |
| 703 | CVE-2025-2009 |
|
75.2th | 7.2 | The Newsletters plugin for WordPress has a stored XSS vulnerability in its logging functionality tha | |
| 704 | CVE-2026-23864 |
|
75.2th | 7.5 | Multiple denial of service vulnerabilities in React Server Components allow attackers to crash serve | |
| 705 | CVE-2024-9920 |
|
75.1th | 8.8 | This vulnerability allows attackers to upload malicious files with dangerous extensions (.py, .sh, . | |
| 706 | CVE-2025-53416 |
|
75.1th | 7.8 | This vulnerability in Delta Electronics DTN Soft allows remote code execution through deserializatio | |
| 707 | CVE-2025-53415 |
|
75.1th | 7.8 | This vulnerability allows remote code execution through deserialization of untrusted data in Delta E | |
| 708 | CVE-2025-25243 |
|
75th | 8.6 | CVE-2025-25243 is an unauthenticated arbitrary file download vulnerability in SAP Supplier Relations | |
| 709 | CVE-2026-0785 |
|
75th | 8.8 | CVE-2026-0785 is a command injection vulnerability in ALGO 8180 IP Audio Alerter devices that allows | |
| 710 | CVE-2025-21371 |
|
75th | 8.8 | This vulnerability allows remote attackers to execute arbitrary code on Windows systems by exploitin | |
| 711 | CVE-2025-0185 |
|
75th | 8.8 | This vulnerability in Dify Tools' Vanna module allows attackers to inject malicious queries through | |
| 712 | CVE-2024-13234 |
|
74.9th | 7.5 | The Product Table by WBW WordPress plugin contains an SQL injection vulnerability in the 'additional | |
| 713 | CVE-2025-2240 |
|
74.9th | 7.5 | CVE-2025-2240 is a memory exhaustion vulnerability in Smallrye Fault Tolerance where repeated calls | |
| 714 | CVE-2025-29822 |
|
74.9th | 7.8 | This vulnerability allows an unauthorized attacker to bypass a security feature in Microsoft Office | |
| 715 | CVE-2025-65879 |
|
74.8th | 8.1 | Warehouse Management System 1.2 contains an authenticated arbitrary file deletion vulnerability. Rem | |
| 716 | CVE-2025-49744 |
|
74.8th | 7.0 | A heap-based buffer overflow vulnerability in Microsoft Graphics Component allows authenticated atta | |
| 717 | CVE-2022-40619 |
|
74.8th | 7.7 | This vulnerability allows unauthenticated attackers on the local network to execute arbitrary comman | |
| 718 | CVE-2025-21384 |
|
74.7th | 8.3 | An authenticated attacker can exploit a Server-Side Request Forgery (SSRF) vulnerability in Microsof | |
| 719 | CVE-2025-5391 |
|
74.7th | 8.1 | The WooCommerce Purchase Orders plugin for WordPress has a vulnerability that allows authenticated u | |
| 720 | CVE-2024-54024 |
|
74.7th | 7.2 | This OS command injection vulnerability in Fortinet FortiIsolator allows attackers with super-admin | |
| 721 | CVE-2025-15048 |
|
74.6th | 7.3 | This vulnerability allows remote attackers to execute arbitrary commands on Tenda WH450 routers by i | |
| 722 | CVE-2022-50795 |
|
74.6th | 7.8 | CVE-2022-50795 is a conditional command injection vulnerability in SOUND4 IMPACT/FIRST/PULSE/Eco sys | |
| 723 | CVE-2025-31722 |
|
74.5th | 8.8 | This vulnerability allows attackers with Item/Configure permission in Jenkins to bypass sandbox prot | |
| 724 | CVE-2025-27419 |
|
74.5th | 7.5 | CVE-2025-27419 is a denial-of-service vulnerability in WeGIA web management software that allows una | |
| 725 | CVE-2025-0953 |
|
74.4th | 7.2 | This vulnerability allows unauthenticated attackers to inject malicious scripts into WordPress pages | |
| 726 | CVE-2025-0918 |
|
74.4th | 7.2 | The SMTP for SendGrid – YaySMTP WordPress plugin up to version 1.3.1 contains a stored cross-site | |
| 727 | CVE-2025-0916 |
|
74.4th | 7.2 | This vulnerability allows unauthenticated attackers to inject malicious scripts into WordPress pages | |
| 728 | CVE-2024-8474 |
|
74.3th | 7.5 | OpenVPN Connect versions before 3.5.0 log the configuration profile's private key in clear text with | |
| 729 | CVE-2025-53475 |
|
74.3th | 8.8 | This vulnerability in Advantech iView allows authenticated attackers with user-level privileges to p | |
| 730 | CVE-2023-53772 |
|
74.3th | 7.5 | MiniDVBLinux 5.4 contains an arbitrary file disclosure vulnerability that allows unauthenticated att | |
| 731 | CVE-2025-2243 |
|
74.3th | 7.3 | A server-side request forgery (SSRF) vulnerability in Bitdefender GravityZone Console allows attacke | |
| 732 | CVE-2025-32709 |
|
74.3th | 7.8 | KEV | A null pointer dereference vulnerability in Windows Ancillary Function Driver for WinSock allows aut |
| 733 | CVE-2025-29281 |
|
74.3th | 8.8 | PerfreeBlog 4.0.11 contains an arbitrary file upload vulnerability in the attach component that allo | |
| 734 | CVE-2025-3161 |
|
74.2th | 8.8 | A critical stack-based buffer overflow vulnerability in Tenda AC10 routers allows remote attackers t | |
| 735 | CVE-2025-29811 |
|
74.2th | 7.8 | This vulnerability allows an authorized attacker with local access to a Windows system to exploit im | |
| 736 | CVE-2025-29967 |
|
74.2th | 8.8 | A heap-based buffer overflow vulnerability in Microsoft's Remote Desktop Gateway Service allows unau | |
| 737 | CVE-2025-48868 |
|
74.1th | 7.2 | Horilla HRMS version 1.3.0 contains an authenticated Remote Code Execution vulnerability where privi | |
| 738 | CVE-2025-68455 |
|
74.1th | 7.2 | This vulnerability allows authenticated remote code execution in Craft CMS when an attacker with adm | |
| 739 | CVE-2025-2449 |
|
74.1th | 8.8 | This vulnerability in NI FlexLogger's usiReg component allows remote attackers to create arbitrary f | |
| 740 | CVE-2024-12551 |
|
74.1th | 7.8 | This vulnerability allows remote attackers to execute arbitrary code by tricking users into opening | |
| 741 | CVE-2024-12547 |
|
74.1th | 8.8 | This vulnerability allows remote attackers to execute arbitrary code by tricking users into opening | |
| 742 | CVE-2025-34202 |
|
74th | 8.8 | This vulnerability exposes Docker container networks in Vasion Print (formerly PrinterLogic) deploym | |
| 743 | CVE-2025-1851 |
|
74th | 8.8 | A critical stack-based buffer overflow vulnerability in Tenda AC7 routers allows remote attackers to | |
| 744 | CVE-2025-21309 |
|
74th | 8.1 | This vulnerability allows remote attackers to execute arbitrary code on Windows systems running Remo | |
| 745 | CVE-2025-27394 |
|
73.9th | 7.2 | This vulnerability allows an authenticated, highly-privileged remote attacker to execute arbitrary c | |
| 746 | CVE-2025-27393 |
|
73.9th | 7.2 | This vulnerability in Siemens SCALANCE LPE9403 industrial network devices allows authenticated high- | |
| 747 | CVE-2025-27392 |
|
73.9th | 7.2 | A vulnerability in SCALANCE LPE9403 industrial network devices allows authenticated high-privileged | |
| 748 | CVE-2024-53800 |
|
73.9th | 8.1 | This vulnerability allows attackers to include local files on the server through PHP's include/requi | |
| 749 | CVE-2025-34225 |
|
73.9th | 8.6 | This CVE describes an unauthenticated server-side request forgery (SSRF) vulnerability in Vasion Pri | |
| 750 | CVE-2025-14107 |
|
73.8th | 8.8 | This CVE describes a command injection vulnerability in ZSPACE Q2C NAS devices that allows remote at |
What is EPSS?
The Exploit Prediction Scoring System (EPSS) is a data-driven model developed by FIRST.org that estimates the probability a CVE will be exploited in the wild within the next 30 days. Unlike CVSS which measures severity, EPSS measures likelihood of exploitation — making it ideal for prioritizing which vulnerabilities to patch first.
Why EPSS matters: With thousands of CVEs published monthly, not all vulnerabilities are equally dangerous. EPSS helps security teams focus on the CVEs most likely to be actively exploited, rather than patching solely by CVSS score. A critical CVSS 9.8 vulnerability with 0.1% EPSS may be less urgent than a high CVSS 7.5 with 90% EPSS.
Prioritize by Exploit Risk
Scan your servers and see which vulnerabilities have the highest EPSS scores. Focus on what attackers are actually targeting.
Start Monitoring Free