Most Exploitable CVEs - EPSS Rankings

CVEs ranked by EPSS (Exploit Prediction Scoring System) probability. Higher scores mean a greater likelihood of exploitation in the wild within the next 30 days.

164
EPSS > 50%
156
CISA KEV Listed
35,468
CVEs with EPSS
0.7%
Avg EPSS Score
All Critical High Medium Low
Rank CVE ID EPSS Score Percentile CVSS Flags Summary
751 CVE-2024-13377
0.81%
73.8th 7.2 The Gravity Forms WordPress plugin has a stored XSS vulnerability in the 'alt' parameter that allows
752 CVE-2025-0511
0.81%
73.8th 7.2 The Welcart e-Commerce plugin for WordPress has a stored cross-site scripting (XSS) vulnerability in
753 CVE-2025-30382
0.81%
73.8th 7.8 This vulnerability allows an unauthorized attacker to execute arbitrary code on SharePoint servers b
754 CVE-2025-62703
0.81%
73.7th 8.8 This CVE describes a remote code execution vulnerability in Fugue's RPC server implementation. Attac
755 CVE-2025-21400
0.81%
73.7th 8.0 CVE-2025-21400 is a remote code execution vulnerability in Microsoft SharePoint Server that allows a
756 CVE-2025-21369
0.81%
73.7th 8.8 This vulnerability allows remote code execution via Microsoft Digest Authentication, enabling attack
757 CVE-2022-50695
0.81%
73.7th 7.5 This vulnerability allows unauthenticated attackers to abuse network diagnostic scripts (ping.php, t
758 CVE-2025-1538
0.8%
73.7th 8.8 A critical heap-based buffer overflow vulnerability in D-Link DAP-1320's set_ws_action function allo
759 CVE-2024-13888
0.8%
73.7th 7.2 The WPMobile.App WordPress plugin contains an open redirect vulnerability that allows unauthenticate
760 CVE-2025-23249
0.8%
73.7th 7.6 The NVIDIA NeMo Framework vulnerability allows remote attackers to execute arbitrary code by exploit
761 CVE-2025-63657
0.8%
73.6th 7.5 An out-of-bounds read vulnerability in Monkey web server's mk_mimetype_find function allows attacker
762 CVE-2025-63656
0.8%
73.6th 7.5 An out-of-bounds read vulnerability in Monkey web server's HTTP parser allows attackers to cause den
763 CVE-2025-63653
0.8%
73.6th 7.5 An out-of-bounds read vulnerability in Monkey web server's mk_vhost_fdt_close function allows attack
764 CVE-2025-63652
0.8%
73.6th 7.5 A use-after-free vulnerability in Monkey web server's HTTP request handling allows attackers to cras
765 CVE-2025-2802
0.8%
73.6th 7.3 The LayoutBoxx WordPress plugin allows unauthenticated attackers to execute arbitrary shortcodes due
766 CVE-2024-13738
0.8%
73.6th 7.3 This vulnerability allows unauthenticated attackers to execute arbitrary WordPress shortcodes in the
767 CVE-2025-32906
0.8%
73.5th 7.5 An out-of-bounds read vulnerability in libsoup's soup_headers_parse_request() function allows attack
768 CVE-2024-11169
0.79%
73.5th 7.5 An unhandled exception in the fs module of danny-avila/librechat allows unauthenticated attackers to
769 CVE-2025-26631
0.79%
73.5th 7.3 This vulnerability in Visual Studio Code allows an authorized attacker to execute arbitrary code wit
770 CVE-2025-29791
0.79%
73.5th 7.8 A type confusion vulnerability in Microsoft Office allows attackers to execute arbitrary code on vul
771 CVE-2025-27749
0.79%
73.4th 7.8 A use-after-free vulnerability in Microsoft Office allows attackers to execute arbitrary code on vul
772 CVE-2025-27747
0.79%
73.4th 7.8 A use-after-free vulnerability in Microsoft Office Word allows attackers to execute arbitrary code o
773 CVE-2025-27745
0.79%
73.4th 7.8 CVE-2025-27745 is a use-after-free vulnerability in Microsoft Office that allows local attackers to
774 CVE-2025-27741
0.79%
73.4th 7.8 This vulnerability is an out-of-bounds read in Windows NTFS that allows a local attacker to read mem
775 CVE-2025-27483
0.79%
73.4th 7.8 This vulnerability is an out-of-bounds read in Windows NTFS that allows a local attacker to read sen
776 CVE-2024-8053
0.78%
73.3th 8.2 This vulnerability in open-webui v0.3.10 allows unauthenticated attackers to access the PDF generati
777 CVE-2024-11343
0.78%
73.2th 8.3 This vulnerability in Progress Telerik Document Processing Libraries allows attackers to perform pat
778 CVE-2025-21379
0.78%
73.2th 7.1 This vulnerability allows remote attackers to execute arbitrary code on affected systems by sending
779 CVE-2024-13793
0.78%
73.2th 7.3 This vulnerability allows unauthenticated attackers to execute arbitrary WordPress shortcodes in the
780 CVE-2024-12537
0.77%
73.2th 7.5 This vulnerability in open-webui version 0.3.32 allows unauthenticated attackers to send large POST
781 CVE-2024-57536
0.77%
73.1th 8.0 This CVE describes a command injection vulnerability in the Linksys E8450 router's wizard_status com
782 CVE-2025-0349
0.77%
73.1th 8.8 A critical stack-based buffer overflow vulnerability in Tenda AC6 routers allows remote attackers to
783 CVE-2025-3785
0.77%
73.1th 8.8 This critical vulnerability in D-Link DWR-M961 routers allows remote attackers to execute arbitrary
784 CVE-2025-49741
0.77%
73.1th 7.4 This vulnerability in Microsoft Edge (Chromium-based) allows unauthorized attackers to access sensit
785 CVE-2022-50936
0.77%
73.1th 8.8 This vulnerability allows authenticated attackers to execute arbitrary PHP code on WBCE CMS servers
786 CVE-2025-21346
0.77%
73th 7.1 This CVE describes a security feature bypass vulnerability in Microsoft Office that could allow atta
787 CVE-2025-56431
0.77%
73th 7.5 This directory traversal vulnerability in FearlessCMS allows remote attackers to use the plugin-hand
788 CVE-2025-56430
0.77%
73th 7.5 This CVE describes a directory traversal vulnerability in FearlessCMS that allows remote attackers t
789 CVE-2025-30479
0.77%
73th 8.4 Dell CloudLink versions before 8.2 contain an OS command injection vulnerability (CWE-78) where auth
790 CVE-2025-21361
0.76%
72.9th 7.8 Microsoft Outlook contains a remote code execution vulnerability that allows attackers to execute ar
791 CVE-2024-43097
0.76%
72.9th 7.8 This vulnerability is an integer overflow in Skia's SkRegion.cpp that leads to out-of-bounds write.
792 CVE-2025-64120
0.76%
72.9th 8.8 This OS command injection vulnerability in Nuvation Energy Multi-Stack Controller allows attackers t
793 CVE-2024-53305
0.76%
72.9th 7.3 This vulnerability allows remote attackers to execute arbitrary code on Whoogle Search instances by
794 CVE-2024-25183
0.76%
72.9th 7.5 CVE-2024-25183 is a directory traversal vulnerability in givanz VvvebJs 1.7.2 that allows attackers
795 CVE-2024-49749
0.76%
72.8th 8.8 This vulnerability allows remote attackers to execute arbitrary code on affected systems without use
796 CVE-2025-21362
0.76%
72.8th 8.4 This vulnerability allows attackers to execute arbitrary code on a victim's system by tricking them
797 CVE-2025-2807
0.75%
72.8th 8.8 This vulnerability allows authenticated WordPress users with Subscriber-level access or higher to in
798 CVE-2025-59295
0.75%
72.7th 8.8 A heap-based buffer overflow vulnerability in Internet Explorer allows remote attackers to execute a
799 CVE-2025-5322
0.75%
72.7th 7.2 The VikRentCar WordPress plugin up to version 1.4.3 allows authenticated administrators to upload ar
800 CVE-2025-5966
0.75%
72.7th 8.1 This vulnerability allows attackers to inject malicious scripts into the 'Attachments by filename ke

What is EPSS?

The Exploit Prediction Scoring System (EPSS) is a data-driven model developed by FIRST.org that estimates the probability a CVE will be exploited in the wild within the next 30 days. Unlike CVSS which measures severity, EPSS measures likelihood of exploitation — making it ideal for prioritizing which vulnerabilities to patch first.

Why EPSS matters: With thousands of CVEs published monthly, not all vulnerabilities are equally dangerous. EPSS helps security teams focus on the CVEs most likely to be actively exploited, rather than patching solely by CVSS score. A critical CVSS 9.8 vulnerability with 0.1% EPSS may be less urgent than a high CVSS 7.5 with 90% EPSS.

Prioritize by Exploit Risk

Scan your servers and see which vulnerabilities have the highest EPSS scores. Focus on what attackers are actually targeting.

Start Monitoring Free