Most Exploitable CVEs - EPSS Rankings
CVEs ranked by EPSS (Exploit Prediction Scoring System) probability. Higher scores mean a greater likelihood of exploitation in the wild within the next 30 days.
| Rank | CVE ID | EPSS Score | Percentile | CVSS | Flags | Summary |
|---|---|---|---|---|---|---|
| 7651 | CVE-2025-2089 |
|
34.8th | 5.4 | This vulnerability in StarSea99 starsea-mall allows attackers to bypass access controls and modify u | |
| 7652 | CVE-2025-39399 |
|
34.8th | 7.5 | This vulnerability allows attackers to include local files on the server through improper filename c | |
| 7653 | CVE-2025-39391 |
|
34.8th | 7.5 | This vulnerability allows attackers to include local files on the server through improper filename c | |
| 7654 | CVE-2025-39387 |
|
34.8th | 7.5 | This vulnerability allows attackers to include local files on the server through improper filename c | |
| 7655 | CVE-2025-39378 |
|
34.8th | 7.5 | This vulnerability allows attackers to include local files on the server through improper filename c | |
| 7656 | CVE-2025-39360 |
|
34.8th | 7.5 | This vulnerability allows attackers to include local files on the server through improper filename c | |
| 7657 | CVE-2025-32921 |
|
34.8th | 7.5 | This vulnerability allows attackers to include local files on the server through improper filename c | |
| 7658 | CVE-2025-1534 |
|
34.8th | 5.4 | This CVE describes a cross-site scripting (XSS) vulnerability in Payara Server, allowing attackers t | |
| 7659 | CVE-2025-27528 |
|
34.8th | 9.1 | This vulnerability allows attackers to exploit insecure deserialization in Apache InLong's JDBC comp | |
| 7660 | CVE-2025-32925 |
|
34.8th | 8.3 | This vulnerability allows attackers to include local files on the server through improper filename c | |
| 7661 | CVE-2024-45516 |
|
34.8th | 6.1 | A Cross-Site Scripting (XSS) vulnerability in Zimbra Collaboration's Classic UI allows attackers to | |
| 7662 | CVE-2025-32975 |
|
34.7th | 10.0 | This CVE describes an authentication bypass vulnerability in Quest KACE Systems Management Appliance | |
| 7663 | CVE-2025-23100 |
|
34.7th | 7.5 | A NULL pointer dereference vulnerability in Samsung Exynos mobile processors allows attackers to cau | |
| 7664 | CVE-2023-45584 |
|
34.8th | 6.6 | A double free vulnerability in multiple Fortinet products allows privileged attackers to execute arb | |
| 7665 | CVE-2025-10891 |
|
34.7th | 8.8 | An integer overflow vulnerability in Chrome's V8 JavaScript engine allows remote attackers to trigge | |
| 7666 | CVE-2025-43347 |
|
34.7th | 9.8 | An input validation vulnerability in Apple operating systems allows attackers to execute arbitrary c | |
| 7667 | CVE-2025-54376 |
|
34.7th | 7.5 | Hoverfly versions 1.11.3 and prior have an authentication bypass vulnerability in the admin WebSocke | |
| 7668 | CVE-2025-60834 |
|
34.8th | 6.5 | A deserialization vulnerability in uzy-ssm-mall v1.1.0 allows attackers to execute arbitrary code by | |
| 7669 | CVE-2025-43727 |
|
34.8th | 7.5 | An authentication bypass vulnerability in Dell PowerProtect Data Domain's RestAPI allows unauthentic | |
| 7670 | CVE-2024-58336 |
|
34.8th | 5.3 | Akuvox Smart Intercom S539 devices contain an unauthenticated vulnerability that allows remote attac | |
| 7671 | CVE-2025-66429 |
|
34.7th | 8.8 | A directory traversal vulnerability in cPanel's Team Manager API allows attackers to overwrite arbit | |
| 7672 | CVE-2025-11837 |
|
34.7th | 9.8 | This critical vulnerability in Malware Remover allows remote attackers to bypass security protection | |
| 7673 | CVE-2026-25056 |
|
34.7th | 8.8 | This vulnerability in n8n's Merge node allows authenticated users with workflow creation/modificatio | |
| 7674 | CVE-2025-58382 |
|
34.8th | 7.2 | This vulnerability in Brocade Fabric OS allows authenticated remote attackers with administrative cr | |
| 7675 | CVE-2024-40693 |
|
34.7th | 8.0 | IBM Planning Analytics 2.0 and 2.1 have a file upload vulnerability that allows attackers to upload | |
| 7676 | CVE-2024-25034 |
|
34.7th | 8.0 | IBM Planning Analytics 2.0 and 2.1 have a file upload vulnerability in the File Manager T1 process t | |
| 7677 | CVE-2025-22980 |
|
34.7th | 6.7 | A SQL injection vulnerability in SLiMS 9 Bulian 9.6.1 allows attackers to execute arbitrary SQL comm | |
| 7678 | CVE-2025-0580 |
|
34.6th | 5.6 | This CVE describes an authorization bypass vulnerability in Shiprocket Module 3 for OpenCart. Attack | |
| 7679 | CVE-2025-0545 |
|
34.5th | 4.7 | This Cross-Site Scripting (XSS) vulnerability in Tekrom Technology T-Soft E-Commerce allows attacker | |
| 7680 | CVE-2024-13528 |
|
34.6th | 7.5 | The Customer Email Verification for WooCommerce WordPress plugin has an authentication bypass vulner | |
| 7681 | CVE-2025-1084 |
|
34.6th | 4.3 | This vulnerability allows attackers to perform Cross-Site Request Forgery (CSRF) attacks against Min | |
| 7682 | CVE-2025-31624 |
|
34.7th | 6.5 | This DOM-based Cross-Site Scripting (XSS) vulnerability in the LABCAT Processing Projects WordPress | |
| 7683 | CVE-2025-31621 |
|
34.7th | 6.5 | This stored cross-site scripting (XSS) vulnerability in the byBrick Accordion WordPress plugin allow | |
| 7684 | CVE-2025-31614 |
|
34.7th | 6.5 | This stored cross-site scripting (XSS) vulnerability in the WordPress Terms Before Download plugin a | |
| 7685 | CVE-2025-31608 |
|
34.7th | 6.5 | This stored cross-site scripting (XSS) vulnerability in the CookieHint WP WordPress plugin allows at | |
| 7686 | CVE-2025-31604 |
|
34.7th | 6.5 | This vulnerability allows attackers to inject malicious scripts into Cal.com web pages, which execut | |
| 7687 | CVE-2025-31597 |
|
34.7th | 6.5 | This stored cross-site scripting (XSS) vulnerability in the Ultimate Live Cricket WordPress Lite plu | |
| 7688 | CVE-2025-31595 |
|
34.7th | 6.5 | This stored cross-site scripting (XSS) vulnerability in the WordPress Timeline Event History plugin | |
| 7689 | CVE-2025-31592 |
|
34.7th | 6.5 | This stored cross-site scripting (XSS) vulnerability in the WordPress Send E-mail plugin allows atta | |
| 7690 | CVE-2025-31590 |
|
34.7th | 6.5 | This stored cross-site scripting (XSS) vulnerability in the WP Date and Time Shortcode WordPress plu | |
| 7691 | CVE-2025-31586 |
|
34.7th | 6.5 | This stored cross-site scripting (XSS) vulnerability in the GhozyLab Gallery – Photo Albums WordPr | |
| 7692 | CVE-2025-31567 |
|
34.7th | 6.5 | This stored cross-site scripting (XSS) vulnerability in the Themesflat Addons For Elementor WordPres | |
| 7693 | CVE-2025-31559 |
|
34.7th | 6.5 | This DOM-based Cross-Site Scripting (XSS) vulnerability in Caspio Bridge Custom Database Application | |
| 7694 | CVE-2025-31556 |
|
34.7th | 6.5 | This stored cross-site scripting (XSS) vulnerability in the IMPress for IDX Broker WordPress plugin | |
| 7695 | CVE-2025-31549 |
|
34.7th | 6.5 | This DOM-based Cross-Site Scripting (XSS) vulnerability in the Agency Dominion Inc. Fusion WordPress | |
| 7696 | CVE-2025-31543 |
|
34.7th | 6.5 | This DOM-based Cross-Site Scripting (XSS) vulnerability in the Twice Commerce WordPress plugin allow | |
| 7697 | CVE-2025-31535 |
|
34.7th | 6.5 | This DOM-based Cross-Site Scripting (XSS) vulnerability in the Simple Owl Carousel WordPress plugin | |
| 7698 | CVE-2025-31532 |
|
34.7th | 6.5 | This stored cross-site scripting (XSS) vulnerability in the AtomChat WordPress plugin allows attacke | |
| 7699 | CVE-2025-30963 |
|
34.7th | 6.5 | This DOM-based cross-site scripting vulnerability in Crocoblock's JetSmartFilters WordPress plugin a | |
| 7700 | CVE-2025-30961 |
|
34.7th | 6.5 | This DOM-based cross-site scripting (XSS) vulnerability in the Trackserver WordPress plugin allows a |
What is EPSS?
The Exploit Prediction Scoring System (EPSS) is a data-driven model developed by FIRST.org that estimates the probability a CVE will be exploited in the wild within the next 30 days. Unlike CVSS which measures severity, EPSS measures likelihood of exploitation — making it ideal for prioritizing which vulnerabilities to patch first.
Why EPSS matters: With thousands of CVEs published monthly, not all vulnerabilities are equally dangerous. EPSS helps security teams focus on the CVEs most likely to be actively exploited, rather than patching solely by CVSS score. A critical CVSS 9.8 vulnerability with 0.1% EPSS may be less urgent than a high CVSS 7.5 with 90% EPSS.
Prioritize by Exploit Risk
Scan your servers and see which vulnerabilities have the highest EPSS scores. Focus on what attackers are actually targeting.
Start Monitoring Free