Most Exploitable CVEs - EPSS Rankings
CVEs ranked by EPSS (Exploit Prediction Scoring System) probability. Higher scores mean a greater likelihood of exploitation in the wild within the next 30 days.
| Rank | CVE ID | EPSS Score | Percentile | CVSS | Flags | Summary |
|---|---|---|---|---|---|---|
| 7751 | CVE-2025-4522 |
|
13.2th | 6.5 | This vulnerability allows authenticated WordPress users with Subscriber-level access or higher to de | |
| 7752 | CVE-2025-5745 |
|
13.4th | 5.6 | A Power10-specific optimization bug in GNU C Library's strncmp function corrupts non-volatile vector | |
| 7753 | CVE-2025-20103 |
|
13.2th | 6.5 | This vulnerability in certain Intel processors allows an authenticated local user to cause denial of | |
| 7754 | CVE-2025-5694 |
|
13.3th | 6.3 | This critical SQL injection vulnerability in PHPGurukul Human Metapneumovirus Testing Management Sys | |
| 7755 | CVE-2025-62002 |
|
13.3th | 4.3 | This vulnerability in BullWall Ransomware Containment allows authenticated attackers to bypass detec | |
| 7756 | CVE-2024-35322 |
|
13.2th | 6.1 | MyNET up to version 26.08 contains a reflected cross-site scripting (XSS) vulnerability in the fiche | |
| 7757 | CVE-2025-10752 |
|
13.4th | 4.3 | This CSRF vulnerability in the OAuth Single Sign On plugin for WordPress allows attackers to forge O | |
| 7758 | CVE-2025-0836 |
|
13.2th | 6.3 | This CVE describes a broken access control vulnerability in Milestone Systems XProtect VMS where use | |
| 7759 | CVE-2025-15448 |
|
13.1th | 6.3 | This vulnerability allows remote attackers to upload arbitrary files to JavaMall applications due to | |
| 7760 | CVE-2025-36371 |
|
13.1th | 6.5 | IBM i operating systems (versions 7.2-7.6) have an information disclosure vulnerability in the datab | |
| 7761 | CVE-2025-8525 |
|
12.8th | 5.3 | This vulnerability in Exrick xboot allows remote attackers to access sensitive information through S | |
| 7762 | CVE-2025-3793 |
|
12.8th | 4.2 | The Buddypress Force Password Change WordPress plugin contains an authentication bypass vulnerabilit | |
| 7763 | CVE-2025-57055 |
|
13.1th | 6.5 | WonderCMS 3.5.0 contains a Server-Side Request Forgery (SSRF) vulnerability in its custom module ins | |
| 7764 | CVE-2025-13679 |
|
13th | 6.5 | This vulnerability allows authenticated WordPress users with Subscriber-level access or higher to en | |
| 7765 | CVE-2021-47664 |
|
13th | 5.3 | CVE-2021-47664 allows unauthenticated remote attackers to enumerate valid usernames due to improper | |
| 7766 | CVE-2025-14028 |
|
12.9th | 4.4 | This vulnerability allows authenticated WordPress administrators to inject malicious scripts into th | |
| 7767 | CVE-2025-55079 |
|
13th | 5.5 | This vulnerability in Eclipse ThreadX allows threads to be created with higher priority than configu | |
| 7768 | CVE-2025-56694 |
|
13.1th | 5.8 | This vulnerability in lumasoft fotoShare Cloud allows unauthenticated attackers to bypass password p | |
| 7769 | CVE-2025-14372 |
|
13th | 6.1 | A use-after-free vulnerability in Google Chrome's Password Manager allows remote attackers to potent | |
| 7770 | CVE-2025-68659 |
|
12.9th | 4.3 | Discourse versions before 3.5.4, 2025.11.2, 2025.12.1, and 2026.1.0 have an application-level denial | |
| 7771 | CVE-2026-22247 |
|
13.1th | 4.1 | GLPI administrators can exploit a Server-Side Request Forgery (SSRF) vulnerability through the Webho | |
| 7772 | CVE-2025-71001 |
|
13th | 6.5 | A segmentation violation vulnerability in OneFlow's flow.column_stack component allows attackers to | |
| 7773 | CVE-2025-64749 |
|
12.9th | 4.3 | This CVE describes an information disclosure vulnerability in Directus where unauthorized users can | |
| 7774 | CVE-2025-8755 |
|
13th | 5.3 | This vulnerability allows remote attackers to bypass authorization checks in the macrozheng mall e-c | |
| 7775 | CVE-2025-5410 |
|
13th | 4.3 | This CSRF vulnerability in Mist Community Edition allows attackers to trick authenticated users into | |
| 7776 | CVE-2025-50978 |
|
12.8th | 6.1 | Gitblit v1.7.1 has a reflected XSS vulnerability where attackers can inject malicious JavaScript via | |
| 7777 | CVE-2025-21711 |
|
12.8th | 5.5 | This CVE describes an integer overflow vulnerability in the Linux kernel's ROSE protocol implementat | |
| 7778 | CVE-2025-64116 |
|
12.9th | 6.1 | This vulnerability allows attackers to redirect authenticated users to malicious external websites v | |
| 7779 | CVE-2025-51825 |
|
13th | 6.5 | JeecgBoot versions 3.4.3 through 3.8.0 contain a SQL injection vulnerability in the /jeecg-boot/onli | |
| 7780 | CVE-2025-7772 |
|
12.9th | 6.5 | This vulnerability in the Malcure Malware Scanner WordPress plugin allows authenticated attackers wi | |
| 7781 | CVE-2025-25529 |
|
12.9th | 5.1 | A buffer overflow vulnerability in Digital China DCBC Gateway 200-2.1.1 allows attackers to crash th | |
| 7782 | CVE-2025-11853 |
|
13th | 6.3 | CVE-2025-11853 is an improper access control vulnerability in Sismics Teedy's API endpoint that allo | |
| 7783 | CVE-2025-40807 |
|
13.1th | 6.3 | Gridscale X Prepay versions before V4.2.1 are vulnerable to authentication token capture-replay atta | |
| 7784 | CVE-2025-5173 |
|
12.8th | 5.3 | This vulnerability in HumanSignal label-studio-ml-backend allows local attackers to execute arbitrar | |
| 7785 | CVE-2025-48341 |
|
13th | 5.9 | This stored cross-site scripting (XSS) vulnerability in the Form Maker by 10Web WordPress plugin all | |
| 7786 | CVE-2025-63293 |
|
12.8th | 6.5 | This vulnerability allows authenticated users to append comments or upload attachments to tickets th | |
| 7787 | CVE-2025-13160 |
|
13.1th | 5.3 | IQ-Support software by IQ Service International contains an information exposure vulnerability that | |
| 7788 | CVE-2025-10737 |
|
13th | 6.4 | This vulnerability allows authenticated WordPress users with contributor-level access or higher to i | |
| 7789 | CVE-2025-49135 |
|
13th | 6.5 | This vulnerability in CVAT allows authenticated users with 'user' role to access other users' upload | |
| 7790 | CVE-2025-62423 |
|
12.8th | 6.7 | This is a blind SQL injection vulnerability in ClipBucket V5's admin login-as-user functionality. At | |
| 7791 | CVE-2025-40940 |
|
12.8th | 4.9 | A vulnerability in SIMATIC CN 4100 industrial communication devices allows attackers to exploit inco | |
| 7792 | CVE-2025-12649 |
|
13th | 6.4 | The SortTable Post WordPress plugin has a stored XSS vulnerability that allows authenticated attacke | |
| 7793 | CVE-2025-12666 |
|
12.8th | 6.4 | This stored XSS vulnerability in the Google Drive upload and download link WordPress plugin allows a | |
| 7794 | CVE-2025-12712 |
|
12.8th | 6.4 | The Shouty WordPress plugin has a stored cross-site scripting vulnerability that allows authenticate | |
| 7795 | CVE-2025-15199 |
|
12.9th | 6.3 | This vulnerability allows remote attackers to upload arbitrary files via the image parameter in the | |
| 7796 | CVE-2025-8413 |
|
13th | 6.4 | The Listeo WordPress theme versions up to 2.0.8 contain a stored XSS vulnerability in the soundcloud | |
| 7797 | CVE-2025-8588 |
|
12.8th | 6.4 | This vulnerability allows authenticated attackers with contributor-level or higher access in WordPre | |
| 7798 | CVE-2025-66845 |
|
12.8th | 6.1 | A reflected Cross-Site Scripting vulnerability in TechStore version 1.0 allows attackers to inject m | |
| 7799 | CVE-2024-57834 |
|
12.8th | 5.5 | A null pointer dereference vulnerability in the Linux kernel's vidtv media test driver allows local | |
| 7800 | CVE-2025-5184 |
|
13th | 4.3 | This vulnerability in Summer Pearl Group Vacation Rental Management Platform allows remote attackers |
What is EPSS?
The Exploit Prediction Scoring System (EPSS) is a data-driven model developed by FIRST.org that estimates the probability a CVE will be exploited in the wild within the next 30 days. Unlike CVSS which measures severity, EPSS measures likelihood of exploitation — making it ideal for prioritizing which vulnerabilities to patch first.
Why EPSS matters: With thousands of CVEs published monthly, not all vulnerabilities are equally dangerous. EPSS helps security teams focus on the CVEs most likely to be actively exploited, rather than patching solely by CVSS score. A critical CVSS 9.8 vulnerability with 0.1% EPSS may be less urgent than a high CVSS 7.5 with 90% EPSS.
Prioritize by Exploit Risk
Scan your servers and see which vulnerabilities have the highest EPSS scores. Focus on what attackers are actually targeting.
Start Monitoring Free