Most Exploitable CVEs - EPSS Rankings
CVEs ranked by EPSS (Exploit Prediction Scoring System) probability. Higher scores mean a greater likelihood of exploitation in the wild within the next 30 days.
| Rank | CVE ID | EPSS Score | Percentile | CVSS | Flags | Summary |
|---|---|---|---|---|---|---|
| 7451 | CVE-2024-57757 |
|
35.3th | 7.5 | CVE-2024-57757 is an authentication bypass vulnerability in JeeWMS that allows attackers to bypass p | |
| 7452 | CVE-2023-51323 |
|
35.4th | 6.5 | This vulnerability allows attackers to send excessive password reset emails to legitimate users by e | |
| 7453 | CVE-2025-21359 |
|
35.3th | 7.8 | This Windows kernel vulnerability allows attackers to bypass security features, potentially gaining | |
| 7454 | CVE-2023-52983 |
|
35.4th | 7.8 | This is a use-after-free vulnerability in the Linux kernel's BFQ I/O scheduler that could allow loca | |
| 7455 | CVE-2024-11449 |
|
35.3th | 7.5 | This vulnerability in haotian-liu/llava version 1.2.0 allows attackers to perform Server-Side Reques | |
| 7456 | CVE-2024-25132 |
|
35.3th | 4.3 | A denial-of-service vulnerability in OpenShift Dedicated's Hive hibernation controller allows attack | |
| 7457 | CVE-2025-30139 |
|
35.4th | 9.8 | G-Net Dashcam BB GONX devices have hardcoded default Wi-Fi credentials that cannot be changed, allow | |
| 7458 | CVE-2025-32431 |
|
35.3th | 9.1 | Traefik reverse proxy versions before 2.11.24, 3.3.6, and 3.4.0-rc2 contain a path traversal vulnera | |
| 7459 | CVE-2025-3405 |
|
35.4th | 4.3 | This vulnerability in FCJ Venture Builder's appclientefiel 3.0.27 allows attackers to manipulate res | |
| 7460 | CVE-2025-3299 |
|
35.3th | 7.3 | This critical SQL injection vulnerability in PHPGurukul Men Salon Management System 1.0 allows attac | |
| 7461 | CVE-2025-2544 |
|
35.3th | 6.4 | The AI Content Pipelines WordPress plugin versions up to 1.6 contain a stored cross-site scripting v | |
| 7462 | CVE-2025-40906 |
|
35.4th | 9.8 | CVE-2025-40906 affects BSON::XS versions 0.8.4 and earlier for Perl, which bundle a vulnerable libbs | |
| 7463 | CVE-2025-6897 |
|
35.3th | 5.5 | This critical vulnerability in D-Link DI-7300G+ routers allows remote attackers to execute arbitrary | |
| 7464 | CVE-2024-57190 |
|
35.4th | 9.8 | CVE-2024-57190 is an authentication bypass vulnerability in Erxes that allows attackers to impersona | |
| 7465 | CVE-2025-5849 |
|
35.4th | 8.8 | A critical stack-based buffer overflow vulnerability in Tenda AC15 routers allows remote attackers t | |
| 7466 | CVE-2025-5847 |
|
35.4th | 8.8 | This critical vulnerability in Tenda AC9 routers allows remote attackers to execute arbitrary code v | |
| 7467 | CVE-2025-41688 |
|
35.4th | 7.2 | This vulnerability allows a high-privileged remote attacker to execute arbitrary operating system co | |
| 7468 | CVE-2025-3671 |
|
35.4th | 8.8 | The WPGYM WordPress plugin has a Local File Inclusion vulnerability that allows authenticated attack | |
| 7469 | CVE-2025-8803 |
|
35.4th | 5.3 | This vulnerability in Open5GS AMF component allows remote attackers to cause denial of service by ex | |
| 7470 | CVE-2025-8800 |
|
35.4th | 5.3 | A denial-of-service vulnerability exists in Open5GS AMF component where the esm_handle_pdn_connectiv | |
| 7471 | CVE-2025-10725 |
|
35.3th | 9.9 | A privilege escalation vulnerability in Red Hat OpenShift AI Service allows authenticated low-privil | |
| 7472 | CVE-2025-55557 |
|
35.4th | 7.5 | A vulnerability in PyTorch v2.7.0 causes a Name Error when models containing torch.cummin operations | |
| 7473 | CVE-2026-20700 |
|
35.4th | 7.8 | KEV | A memory corruption vulnerability in Apple operating systems allows attackers with memory write capa |
| 7474 | CVE-2025-49935 |
|
35.3th | 7.4 | This CVE describes a PHP Local File Inclusion vulnerability in the WoodMart WordPress theme. Attacke | |
| 7475 | CVE-2025-13069 |
|
35.4th | 8.8 | The Enable SVG, WebP, and ICO Upload WordPress plugin allows authenticated attackers with author-lev | |
| 7476 | CVE-2021-4467 |
|
35.3th | N/A | This vulnerability allows unauthenticated remote attackers to cause denial-of-service by flooding th | |
| 7477 | CVE-2025-12846 |
|
35.4th | 8.8 | The Blocksy Companion WordPress plugin allows authenticated users with author privileges or higher t | |
| 7478 | CVE-2025-59683 |
|
35.4th | 8.2 | Pexip Infinity versions 15.0 through 38.0 have an improper access control vulnerability in the Secur | |
| 7479 | CVE-2025-68143 |
|
35.4th | N/A | The git_init tool in mcp-server-git versions prior to 2025.9.25 allowed arbitrary filesystem path cr | |
| 7480 | CVE-2025-66456 |
|
35.3th | 9.8 | This CVE describes a prototype pollution vulnerability in the Elysia TypeScript framework that, when | |
| 7481 | CVE-2025-13066 |
|
35.4th | 8.8 | The Demo Importer Plus WordPress plugin allows authenticated attackers with author-level access or h | |
| 7482 | CVE-2025-65657 |
|
35.3th | 6.5 | CVE-2025-65657 is a remote code execution vulnerability in FeehiCMS version 2.1.1 that allows authen | |
| 7483 | CVE-2026-1686 |
|
35.4th | 8.8 | A remote buffer overflow vulnerability in Totolink A3600R routers allows attackers to execute arbitr | |
| 7484 | CVE-2025-57529 |
|
35.3th | 9.8 | CVE-2025-57529 is a critical SQL injection vulnerability in YouDataSum CPAS Audit Management System | |
| 7485 | CVE-2024-41739 |
|
35.2th | 8.8 | IBM Cognos Dashboards on Cloud Pak for Data is vulnerable to dependency confusion attacks, allowing | |
| 7486 | CVE-2025-0490 |
|
35.3th | 6.3 | This critical vulnerability in Fanli2012 native-php-cms 1.0 allows remote attackers to execute SQL i | |
| 7487 | CVE-2025-0356 |
|
35.2th | 7.2 | This vulnerability allows remote attackers to execute arbitrary operating system commands on affecte | |
| 7488 | CVE-2025-21336 |
|
35.3th | 5.6 | This Windows cryptographic vulnerability allows attackers to disclose sensitive information from mem | |
| 7489 | CVE-2023-46195 |
|
35.3th | 6.5 | CVE-2023-46195 is a missing authorization vulnerability in the CoSchedule Headline Analyzer WordPres | |
| 7490 | CVE-2024-57423 |
|
35.1th | 6.1 | A Cross-Site Scripting (XSS) vulnerability in CloudClassroom-PHP Project v1.0 allows remote attacker | |
| 7491 | CVE-2025-1024 |
|
35.2th | 4.8 | A reflected cross-site scripting (XSS) vulnerability in ChurchCRM 5.13.0 allows authenticated admini | |
| 7492 | CVE-2025-0903 |
|
35.1th | 8.8 | CVE-2025-0903 is a heap-based buffer overflow vulnerability in PDF-XChange Editor's RTF file parsing | |
| 7493 | CVE-2025-24423 |
|
35.1th | 4.3 | Adobe Commerce has an improper access control vulnerability (CWE-284) that allows low-privileged att | |
| 7494 | CVE-2025-1168 |
|
35.3th | 6.3 | CVE-2025-1168 is a critical SQL injection vulnerability in SourceCodester Contact Manager with Expor | |
| 7495 | CVE-2025-20183 |
|
35.1th | 5.8 | This vulnerability allows unauthenticated remote attackers to bypass the antivirus scanner on Cisco | |
| 7496 | CVE-2025-0973 |
|
35.2th | 5.4 | This critical vulnerability in CmsEasy 7.7.7.9 allows remote attackers to perform path traversal att | |
| 7497 | CVE-2024-12336 |
|
35.2th | 6.5 | This vulnerability in the WC Affiliate WordPress plugin allows authenticated attackers with Subscrib | |
| 7498 | CVE-2025-1672 |
|
35.2th | 5.5 | The Notibar WordPress plugin has a stored cross-site scripting vulnerability that allows authenticat | |
| 7499 | CVE-2024-31525 |
|
35.2th | 7.2 | CVE-2024-31525 is a privilege escalation vulnerability in Peppermint Ticket Management 0.4.6 where r | |
| 7500 | CVE-2025-3963 |
|
35.2th | 7.3 | CVE-2025-3963 is a critical missing authorization vulnerability in withstars Books-Management-System |
What is EPSS?
The Exploit Prediction Scoring System (EPSS) is a data-driven model developed by FIRST.org that estimates the probability a CVE will be exploited in the wild within the next 30 days. Unlike CVSS which measures severity, EPSS measures likelihood of exploitation — making it ideal for prioritizing which vulnerabilities to patch first.
Why EPSS matters: With thousands of CVEs published monthly, not all vulnerabilities are equally dangerous. EPSS helps security teams focus on the CVEs most likely to be actively exploited, rather than patching solely by CVSS score. A critical CVSS 9.8 vulnerability with 0.1% EPSS may be less urgent than a high CVSS 7.5 with 90% EPSS.
Prioritize by Exploit Risk
Scan your servers and see which vulnerabilities have the highest EPSS scores. Focus on what attackers are actually targeting.
Start Monitoring Free