Most Exploitable CVEs - EPSS Rankings

CVEs ranked by EPSS (Exploit Prediction Scoring System) probability. Higher scores mean a greater likelihood of exploitation in the wild within the next 30 days.

164
EPSS > 50%
156
CISA KEV Listed
35,468
CVEs with EPSS
0.7%
Avg EPSS Score
All Critical High Medium Low
Rank CVE ID EPSS Score Percentile CVSS Flags Summary
7751 CVE-2025-4522
0.04%
13.2th 6.5 This vulnerability allows authenticated WordPress users with Subscriber-level access or higher to de
7752 CVE-2025-5745
0.04%
13.4th 5.6 A Power10-specific optimization bug in GNU C Library's strncmp function corrupts non-volatile vector
7753 CVE-2025-20103
0.04%
13.2th 6.5 This vulnerability in certain Intel processors allows an authenticated local user to cause denial of
7754 CVE-2025-5694
0.04%
13.3th 6.3 This critical SQL injection vulnerability in PHPGurukul Human Metapneumovirus Testing Management Sys
7755 CVE-2025-62002
0.04%
13.3th 4.3 This vulnerability in BullWall Ransomware Containment allows authenticated attackers to bypass detec
7756 CVE-2024-35322
0.04%
13.2th 6.1 MyNET up to version 26.08 contains a reflected cross-site scripting (XSS) vulnerability in the fiche
7757 CVE-2025-10752
0.04%
13.4th 4.3 This CSRF vulnerability in the OAuth Single Sign On plugin for WordPress allows attackers to forge O
7758 CVE-2025-0836
0.04%
13.2th 6.3 This CVE describes a broken access control vulnerability in Milestone Systems XProtect VMS where use
7759 CVE-2025-15448
0.04%
13.1th 6.3 This vulnerability allows remote attackers to upload arbitrary files to JavaMall applications due to
7760 CVE-2025-36371
0.04%
13.1th 6.5 IBM i operating systems (versions 7.2-7.6) have an information disclosure vulnerability in the datab
7761 CVE-2025-8525
0.04%
12.8th 5.3 This vulnerability in Exrick xboot allows remote attackers to access sensitive information through S
7762 CVE-2025-3793
0.04%
12.8th 4.2 The Buddypress Force Password Change WordPress plugin contains an authentication bypass vulnerabilit
7763 CVE-2025-57055
0.04%
13.1th 6.5 WonderCMS 3.5.0 contains a Server-Side Request Forgery (SSRF) vulnerability in its custom module ins
7764 CVE-2025-13679
0.04%
13th 6.5 This vulnerability allows authenticated WordPress users with Subscriber-level access or higher to en
7765 CVE-2021-47664
0.04%
13th 5.3 CVE-2021-47664 allows unauthenticated remote attackers to enumerate valid usernames due to improper
7766 CVE-2025-14028
0.04%
12.9th 4.4 This vulnerability allows authenticated WordPress administrators to inject malicious scripts into th
7767 CVE-2025-55079
0.04%
13th 5.5 This vulnerability in Eclipse ThreadX allows threads to be created with higher priority than configu
7768 CVE-2025-56694
0.04%
13.1th 5.8 This vulnerability in lumasoft fotoShare Cloud allows unauthenticated attackers to bypass password p
7769 CVE-2025-14372
0.04%
13th 6.1 A use-after-free vulnerability in Google Chrome's Password Manager allows remote attackers to potent
7770 CVE-2025-68659
0.04%
12.9th 4.3 Discourse versions before 3.5.4, 2025.11.2, 2025.12.1, and 2026.1.0 have an application-level denial
7771 CVE-2026-22247
0.04%
13.1th 4.1 GLPI administrators can exploit a Server-Side Request Forgery (SSRF) vulnerability through the Webho
7772 CVE-2025-71001
0.04%
13th 6.5 A segmentation violation vulnerability in OneFlow's flow.column_stack component allows attackers to
7773 CVE-2025-64749
0.04%
12.9th 4.3 This CVE describes an information disclosure vulnerability in Directus where unauthorized users can
7774 CVE-2025-8755
0.04%
13th 5.3 This vulnerability allows remote attackers to bypass authorization checks in the macrozheng mall e-c
7775 CVE-2025-5410
0.04%
13th 4.3 This CSRF vulnerability in Mist Community Edition allows attackers to trick authenticated users into
7776 CVE-2025-50978
0.04%
12.8th 6.1 Gitblit v1.7.1 has a reflected XSS vulnerability where attackers can inject malicious JavaScript via
7777 CVE-2025-21711
0.04%
12.8th 5.5 This CVE describes an integer overflow vulnerability in the Linux kernel's ROSE protocol implementat
7778 CVE-2025-64116
0.04%
12.9th 6.1 This vulnerability allows attackers to redirect authenticated users to malicious external websites v
7779 CVE-2025-51825
0.04%
13th 6.5 JeecgBoot versions 3.4.3 through 3.8.0 contain a SQL injection vulnerability in the /jeecg-boot/onli
7780 CVE-2025-7772
0.04%
12.9th 6.5 This vulnerability in the Malcure Malware Scanner WordPress plugin allows authenticated attackers wi
7781 CVE-2025-25529
0.04%
12.9th 5.1 A buffer overflow vulnerability in Digital China DCBC Gateway 200-2.1.1 allows attackers to crash th
7782 CVE-2025-11853
0.04%
13th 6.3 CVE-2025-11853 is an improper access control vulnerability in Sismics Teedy's API endpoint that allo
7783 CVE-2025-40807
0.04%
13.1th 6.3 Gridscale X Prepay versions before V4.2.1 are vulnerable to authentication token capture-replay atta
7784 CVE-2025-5173
0.04%
12.8th 5.3 This vulnerability in HumanSignal label-studio-ml-backend allows local attackers to execute arbitrar
7785 CVE-2025-48341
0.04%
13th 5.9 This stored cross-site scripting (XSS) vulnerability in the Form Maker by 10Web WordPress plugin all
7786 CVE-2025-63293
0.04%
12.8th 6.5 This vulnerability allows authenticated users to append comments or upload attachments to tickets th
7787 CVE-2025-13160
0.04%
13.1th 5.3 IQ-Support software by IQ Service International contains an information exposure vulnerability that
7788 CVE-2025-10737
0.04%
13th 6.4 This vulnerability allows authenticated WordPress users with contributor-level access or higher to i
7789 CVE-2025-49135
0.04%
13th 6.5 This vulnerability in CVAT allows authenticated users with 'user' role to access other users' upload
7790 CVE-2025-62423
0.04%
12.8th 6.7 This is a blind SQL injection vulnerability in ClipBucket V5's admin login-as-user functionality. At
7791 CVE-2025-40940
0.04%
12.8th 4.9 A vulnerability in SIMATIC CN 4100 industrial communication devices allows attackers to exploit inco
7792 CVE-2025-12649
0.04%
13th 6.4 The SortTable Post WordPress plugin has a stored XSS vulnerability that allows authenticated attacke
7793 CVE-2025-12666
0.04%
12.8th 6.4 This stored XSS vulnerability in the Google Drive upload and download link WordPress plugin allows a
7794 CVE-2025-12712
0.04%
12.8th 6.4 The Shouty WordPress plugin has a stored cross-site scripting vulnerability that allows authenticate
7795 CVE-2025-15199
0.04%
12.9th 6.3 This vulnerability allows remote attackers to upload arbitrary files via the image parameter in the
7796 CVE-2025-8413
0.04%
13th 6.4 The Listeo WordPress theme versions up to 2.0.8 contain a stored XSS vulnerability in the soundcloud
7797 CVE-2025-8588
0.04%
12.8th 6.4 This vulnerability allows authenticated attackers with contributor-level or higher access in WordPre
7798 CVE-2025-66845
0.04%
12.8th 6.1 A reflected Cross-Site Scripting vulnerability in TechStore version 1.0 allows attackers to inject m
7799 CVE-2024-57834
0.04%
12.8th 5.5 A null pointer dereference vulnerability in the Linux kernel's vidtv media test driver allows local
7800 CVE-2025-5184
0.04%
13th 4.3 This vulnerability in Summer Pearl Group Vacation Rental Management Platform allows remote attackers

What is EPSS?

The Exploit Prediction Scoring System (EPSS) is a data-driven model developed by FIRST.org that estimates the probability a CVE will be exploited in the wild within the next 30 days. Unlike CVSS which measures severity, EPSS measures likelihood of exploitation — making it ideal for prioritizing which vulnerabilities to patch first.

Why EPSS matters: With thousands of CVEs published monthly, not all vulnerabilities are equally dangerous. EPSS helps security teams focus on the CVEs most likely to be actively exploited, rather than patching solely by CVSS score. A critical CVSS 9.8 vulnerability with 0.1% EPSS may be less urgent than a high CVSS 7.5 with 90% EPSS.

Prioritize by Exploit Risk

Scan your servers and see which vulnerabilities have the highest EPSS scores. Focus on what attackers are actually targeting.

Start Monitoring Free