Most Exploitable CVEs - EPSS Rankings

CVEs ranked by EPSS (Exploit Prediction Scoring System) probability. Higher scores mean a greater likelihood of exploitation in the wild within the next 30 days.

164
EPSS > 50%
156
CISA KEV Listed
35,468
CVEs with EPSS
0.7%
Avg EPSS Score
All Critical High Medium Low
Rank CVE ID EPSS Score Percentile CVSS Flags Summary
7451 CVE-2024-57757
0.15%
35.3th 7.5 CVE-2024-57757 is an authentication bypass vulnerability in JeeWMS that allows attackers to bypass p
7452 CVE-2023-51323
0.15%
35.4th 6.5 This vulnerability allows attackers to send excessive password reset emails to legitimate users by e
7453 CVE-2025-21359
0.15%
35.3th 7.8 This Windows kernel vulnerability allows attackers to bypass security features, potentially gaining
7454 CVE-2023-52983
0.15%
35.4th 7.8 This is a use-after-free vulnerability in the Linux kernel's BFQ I/O scheduler that could allow loca
7455 CVE-2024-11449
0.15%
35.3th 7.5 This vulnerability in haotian-liu/llava version 1.2.0 allows attackers to perform Server-Side Reques
7456 CVE-2024-25132
0.15%
35.3th 4.3 A denial-of-service vulnerability in OpenShift Dedicated's Hive hibernation controller allows attack
7457 CVE-2025-30139
0.15%
35.4th 9.8 G-Net Dashcam BB GONX devices have hardcoded default Wi-Fi credentials that cannot be changed, allow
7458 CVE-2025-32431
0.15%
35.3th 9.1 Traefik reverse proxy versions before 2.11.24, 3.3.6, and 3.4.0-rc2 contain a path traversal vulnera
7459 CVE-2025-3405
0.15%
35.4th 4.3 This vulnerability in FCJ Venture Builder's appclientefiel 3.0.27 allows attackers to manipulate res
7460 CVE-2025-3299
0.15%
35.3th 7.3 This critical SQL injection vulnerability in PHPGurukul Men Salon Management System 1.0 allows attac
7461 CVE-2025-2544
0.15%
35.3th 6.4 The AI Content Pipelines WordPress plugin versions up to 1.6 contain a stored cross-site scripting v
7462 CVE-2025-40906
0.15%
35.4th 9.8 CVE-2025-40906 affects BSON::XS versions 0.8.4 and earlier for Perl, which bundle a vulnerable libbs
7463 CVE-2025-6897
0.15%
35.3th 5.5 This critical vulnerability in D-Link DI-7300G+ routers allows remote attackers to execute arbitrary
7464 CVE-2024-57190
0.15%
35.4th 9.8 CVE-2024-57190 is an authentication bypass vulnerability in Erxes that allows attackers to impersona
7465 CVE-2025-5849
0.15%
35.4th 8.8 A critical stack-based buffer overflow vulnerability in Tenda AC15 routers allows remote attackers t
7466 CVE-2025-5847
0.15%
35.4th 8.8 This critical vulnerability in Tenda AC9 routers allows remote attackers to execute arbitrary code v
7467 CVE-2025-41688
0.15%
35.4th 7.2 This vulnerability allows a high-privileged remote attacker to execute arbitrary operating system co
7468 CVE-2025-3671
0.15%
35.4th 8.8 The WPGYM WordPress plugin has a Local File Inclusion vulnerability that allows authenticated attack
7469 CVE-2025-8803
0.15%
35.4th 5.3 This vulnerability in Open5GS AMF component allows remote attackers to cause denial of service by ex
7470 CVE-2025-8800
0.15%
35.4th 5.3 A denial-of-service vulnerability exists in Open5GS AMF component where the esm_handle_pdn_connectiv
7471 CVE-2025-10725
0.15%
35.3th 9.9 A privilege escalation vulnerability in Red Hat OpenShift AI Service allows authenticated low-privil
7472 CVE-2025-55557
0.15%
35.4th 7.5 A vulnerability in PyTorch v2.7.0 causes a Name Error when models containing torch.cummin operations
7473 CVE-2026-20700
0.15%
35.4th 7.8 KEV A memory corruption vulnerability in Apple operating systems allows attackers with memory write capa
7474 CVE-2025-49935
0.15%
35.3th 7.4 This CVE describes a PHP Local File Inclusion vulnerability in the WoodMart WordPress theme. Attacke
7475 CVE-2025-13069
0.15%
35.4th 8.8 The Enable SVG, WebP, and ICO Upload WordPress plugin allows authenticated attackers with author-lev
7476 CVE-2021-4467
0.15%
35.3th N/A This vulnerability allows unauthenticated remote attackers to cause denial-of-service by flooding th
7477 CVE-2025-12846
0.15%
35.4th 8.8 The Blocksy Companion WordPress plugin allows authenticated users with author privileges or higher t
7478 CVE-2025-59683
0.15%
35.4th 8.2 Pexip Infinity versions 15.0 through 38.0 have an improper access control vulnerability in the Secur
7479 CVE-2025-68143
0.15%
35.4th N/A The git_init tool in mcp-server-git versions prior to 2025.9.25 allowed arbitrary filesystem path cr
7480 CVE-2025-66456
0.15%
35.3th 9.8 This CVE describes a prototype pollution vulnerability in the Elysia TypeScript framework that, when
7481 CVE-2025-13066
0.15%
35.4th 8.8 The Demo Importer Plus WordPress plugin allows authenticated attackers with author-level access or h
7482 CVE-2025-65657
0.15%
35.3th 6.5 CVE-2025-65657 is a remote code execution vulnerability in FeehiCMS version 2.1.1 that allows authen
7483 CVE-2026-1686
0.15%
35.4th 8.8 A remote buffer overflow vulnerability in Totolink A3600R routers allows attackers to execute arbitr
7484 CVE-2025-57529
0.15%
35.3th 9.8 CVE-2025-57529 is a critical SQL injection vulnerability in YouDataSum CPAS Audit Management System
7485 CVE-2024-41739
0.15%
35.2th 8.8 IBM Cognos Dashboards on Cloud Pak for Data is vulnerable to dependency confusion attacks, allowing
7486 CVE-2025-0490
0.15%
35.3th 6.3 This critical vulnerability in Fanli2012 native-php-cms 1.0 allows remote attackers to execute SQL i
7487 CVE-2025-0356
0.15%
35.2th 7.2 This vulnerability allows remote attackers to execute arbitrary operating system commands on affecte
7488 CVE-2025-21336
0.15%
35.3th 5.6 This Windows cryptographic vulnerability allows attackers to disclose sensitive information from mem
7489 CVE-2023-46195
0.15%
35.3th 6.5 CVE-2023-46195 is a missing authorization vulnerability in the CoSchedule Headline Analyzer WordPres
7490 CVE-2024-57423
0.15%
35.1th 6.1 A Cross-Site Scripting (XSS) vulnerability in CloudClassroom-PHP Project v1.0 allows remote attacker
7491 CVE-2025-1024
0.15%
35.2th 4.8 A reflected cross-site scripting (XSS) vulnerability in ChurchCRM 5.13.0 allows authenticated admini
7492 CVE-2025-0903
0.15%
35.1th 8.8 CVE-2025-0903 is a heap-based buffer overflow vulnerability in PDF-XChange Editor's RTF file parsing
7493 CVE-2025-24423
0.15%
35.1th 4.3 Adobe Commerce has an improper access control vulnerability (CWE-284) that allows low-privileged att
7494 CVE-2025-1168
0.15%
35.3th 6.3 CVE-2025-1168 is a critical SQL injection vulnerability in SourceCodester Contact Manager with Expor
7495 CVE-2025-20183
0.15%
35.1th 5.8 This vulnerability allows unauthenticated remote attackers to bypass the antivirus scanner on Cisco
7496 CVE-2025-0973
0.15%
35.2th 5.4 This critical vulnerability in CmsEasy 7.7.7.9 allows remote attackers to perform path traversal att
7497 CVE-2024-12336
0.15%
35.2th 6.5 This vulnerability in the WC Affiliate WordPress plugin allows authenticated attackers with Subscrib
7498 CVE-2025-1672
0.15%
35.2th 5.5 The Notibar WordPress plugin has a stored cross-site scripting vulnerability that allows authenticat
7499 CVE-2024-31525
0.15%
35.2th 7.2 CVE-2024-31525 is a privilege escalation vulnerability in Peppermint Ticket Management 0.4.6 where r
7500 CVE-2025-3963
0.15%
35.2th 7.3 CVE-2025-3963 is a critical missing authorization vulnerability in withstars Books-Management-System

What is EPSS?

The Exploit Prediction Scoring System (EPSS) is a data-driven model developed by FIRST.org that estimates the probability a CVE will be exploited in the wild within the next 30 days. Unlike CVSS which measures severity, EPSS measures likelihood of exploitation — making it ideal for prioritizing which vulnerabilities to patch first.

Why EPSS matters: With thousands of CVEs published monthly, not all vulnerabilities are equally dangerous. EPSS helps security teams focus on the CVEs most likely to be actively exploited, rather than patching solely by CVSS score. A critical CVSS 9.8 vulnerability with 0.1% EPSS may be less urgent than a high CVSS 7.5 with 90% EPSS.

Prioritize by Exploit Risk

Scan your servers and see which vulnerabilities have the highest EPSS scores. Focus on what attackers are actually targeting.

Start Monitoring Free