Most Exploitable CVEs - EPSS Rankings

CVEs ranked by EPSS (Exploit Prediction Scoring System) probability. Higher scores mean a greater likelihood of exploitation in the wild within the next 30 days.

164
EPSS > 50%
156
CISA KEV Listed
35,468
CVEs with EPSS
0.7%
Avg EPSS Score
All Critical High Medium Low
Rank CVE ID EPSS Score Percentile CVSS Flags Summary
8201 CVE-2025-30468
0.04%
12.6th 6.5 This vulnerability allows unauthorized access to Private Browsing tabs in Apple iOS/iPadOS without p
8202 CVE-2024-38805
0.04%
12.5th 6.3 CVE-2024-38805 is an integer overflow vulnerability in EDK2 BIOS/UEFI firmware that can be triggered
8203 CVE-2025-66114
0.04%
12.6th 5.3 This vulnerability allows unauthorized users to access WooCommerce product variation data due to mis
8204 CVE-2025-65032
0.04%
12.4th 6.5 An Insecure Direct Object Reference (IDOR) vulnerability in Rallly allows authenticated users to cha
8205 CVE-2025-22892
0.04%
12.6th 6.5 This vulnerability allows unauthenticated attackers on adjacent networks to cause denial of service
8206 CVE-2025-5343
0.04%
12.6th 6.3 This stored cross-site scripting vulnerability in ManageEngine Exchange Reporter Plus allows attacke
8207 CVE-2026-22592
0.04%
12.2th 6.5 This vulnerability in Gogs allows authenticated users to cause a denial-of-service (DoS) attack by d
8208 CVE-2025-36558
0.04%
12.2th 6.1 KUNBUS PiCtory versions 2.11.1 and earlier contain a cross-site scripting (XSS) vulnerability in the
8209 CVE-2026-23632
0.04%
12.2th 6.5 This vulnerability allows attackers with read-only access tokens to modify repository contents in Go
8210 CVE-2025-52602
0.04%
12.1th 4.2 HCL BigFix Query WebUI has an information disclosure vulnerability where HTTP GET requests can expos
8211 CVE-2025-6284
0.04%
12.3th 4.3 This CSRF vulnerability in PHPGurukul Car Rental Portal 3.0 allows attackers to trick authenticated
8212 CVE-2025-10036
0.04%
12.2th 4.9 This SQL injection vulnerability in the WordPress Featured Image from URL (FIFU) plugin allows authe
8213 CVE-2025-53602
0.04%
12.2th 5.3 Zipkin versions through 3.5.1 expose a /heapdump endpoint via Spring Boot Actuator that can be acces
8214 CVE-2025-15223
0.04%
12.1th 4.3 This CVE describes a cross-site scripting (XSS) vulnerability in Philipinho Simple-PHP-Blog's login.
8215 CVE-2025-62062
0.04%
12.2th 5.3 This vulnerability in the WordPress Easy Post Submission plugin allows attackers to retrieve embedde
8216 CVE-2025-27093
0.04%
12.3th 6.3 This vulnerability in Sliver's Wireguard netstack allows unrestricted communication between Wireguar
8217 CVE-2025-53392
0.04%
12.2th 5.0 This vulnerability in pfSense CE 2.8.0 allows users with the 'WebCfg - Diagnostics: Command' privile
8218 CVE-2025-68951
0.04%
12.1th 5.4 This stored XSS vulnerability in phpMyFAQ allows attackers to inject malicious JavaScript into admin
8219 CVE-2025-66403
0.04%
12.1th 4.6 FileRise versions before 2.2.3 have a stored XSS vulnerability where malicious SVG files containing
8220 CVE-2025-64442
0.04%
12.1th 6.1 HumHub versions below 1.17.4 contain a cross-site scripting (XSS) vulnerability in the Meta-Search f
8221 CVE-2025-53986
0.04%
12.1th 5.3 This CVE describes a missing authorization vulnerability in the Hestia WordPress theme that allows a
8222 CVE-2025-14783
0.04%
12.3th 4.3 The Easy Digital Downloads WordPress plugin has an unvalidated redirect vulnerability in all version
8223 CVE-2025-0204
0.04%
12.2th 6.3 CVE-2025-0204 is a critical SQL injection vulnerability in code-projects Online Shoe Store 1.0 that
8224 CVE-2025-64094
0.04%
12.1th 6.4 This CVE describes a cross-site scripting (XSS) vulnerability in DNN CMS where uploaded SVG files ca
8225 CVE-2025-7927
0.04%
12.3th 6.3 This critical SQL injection vulnerability in PHPGurukul Online Banquet Booking System 1.0 allows att
8226 CVE-2021-47917
0.04%
12.3th 6.4 Simple CMS 2.1 contains a persistent cross-site scripting vulnerability in user input parameters tha
8227 CVE-2024-13337
0.04%
12.3th 4.3 This CSRF vulnerability in the Clearfy Cache WordPress plugin allows unauthenticated attackers to ch
8228 CVE-2025-8791
0.04%
12.1th 6.3 This critical vulnerability in LitmusChaos Litmus allows attackers to bypass authorization controls
8229 CVE-2025-11726
0.04%
12.2th 4.3 The Beaver Builder WordPress plugin has a missing authorization vulnerability that allows authentica
8230 CVE-2024-57777
0.04%
12.3th 5.1 A directory traversal vulnerability in Ianproxy v0.1 and earlier allows remote attackers to access s
8231 CVE-2025-64491
0.04%
12.2th 6.1 SuiteCRM versions 7.14.7 and below contain an unauthenticated reflected XSS vulnerability that allow
8232 CVE-2025-11966
0.04%
12.4th 6.4 This stored XSS vulnerability in Eclipse Vert.x allows attackers to inject malicious scripts into di
8233 CVE-2025-21859
0.04%
12.2th 5.5 A race condition in the Linux kernel's USB MIDI gadget driver can cause a deadlock when USB MIDI fun
8234 CVE-2025-62038
0.04%
12.2th 6.5 This vulnerability in Sovlix MeetingHub WordPress plugin allows attackers to retrieve embedded sensi
8235 CVE-2025-6867
0.04%
12.1th 4.7 CVE-2025-6867 is a critical SQL injection vulnerability in SourceCodester Simple Company Website 1.0
8236 CVE-2025-4510
0.04%
12.3th 6.3 A critical SQL injection vulnerability exists in Changjietong UFIDA CRM 1.0 through the /optnty/optn
8237 CVE-2025-64497
0.04%
12.2th 6.5 This CVE describes an authorization bypass vulnerability in Tuleap's file release system. Attackers
8238 CVE-2025-50864
0.04%
12.3th 6.5 An origin validation error in the elysia-cors library allows attackers to bypass CORS restrictions b
8239 CVE-2026-21903
0.04%
12.4th 6.5 A stack-based buffer overflow vulnerability in Juniper Junos OS Packet Forwarding Engine allows auth
8240 CVE-2025-64228
0.04%
12.1th 4.3 This vulnerability in the SUMO Affiliates Pro WordPress plugin allows unauthorized users to retrieve
8241 CVE-2025-58872
0.04%
12.3th 6.5 This vulnerability in the Simple Price Calculator WordPress plugin allows attackers to retrieve embe
8242 CVE-2025-66596
0.04%
12.2th 6.1 A host header injection vulnerability in Yokogawa FAST/TOOLS allows attackers to redirect users to m
8243 CVE-2025-6838
0.04%
12.2th 4.1 The Broken Link Notifier WordPress plugin contains a CSV injection vulnerability that allows authent
8244 CVE-2025-21738
0.04%
12.2th 5.5 A buffer overflow vulnerability in the Linux kernel's libata-sff subsystem allows writing beyond all
8245 CVE-2026-21921
0.04%
12.1th 6.5 A Use After Free vulnerability in Juniper's chassis daemon allows authenticated low-privilege attack
8246 CVE-2025-12914
0.04%
12.2th 4.7 This SQL injection vulnerability in aaPanel BaoTa's backend allows attackers to manipulate database
8247 CVE-2025-3745
0.04%
12.3th 6.3 This vulnerability in the WP Lightbox 2 WordPress plugin allows attackers to inject malicious script
8248 CVE-2025-12202
0.04%
12.2th 4.3 This CVE describes a Cross-Site Request Forgery (CSRF) vulnerability in ajayrandhawa's User-Manageme
8249 CVE-2025-32785
0.04%
12.1th 5.4 This vulnerability allows authenticated Pi-hole users to inject malicious JavaScript into the Addres
8250 CVE-2025-33185
0.04%
12.2th 5.3 NVIDIA AIStore has an authentication vulnerability (CWE-862: Missing Authorization) that allows unau

What is EPSS?

The Exploit Prediction Scoring System (EPSS) is a data-driven model developed by FIRST.org that estimates the probability a CVE will be exploited in the wild within the next 30 days. Unlike CVSS which measures severity, EPSS measures likelihood of exploitation — making it ideal for prioritizing which vulnerabilities to patch first.

Why EPSS matters: With thousands of CVEs published monthly, not all vulnerabilities are equally dangerous. EPSS helps security teams focus on the CVEs most likely to be actively exploited, rather than patching solely by CVSS score. A critical CVSS 9.8 vulnerability with 0.1% EPSS may be less urgent than a high CVSS 7.5 with 90% EPSS.

Prioritize by Exploit Risk

Scan your servers and see which vulnerabilities have the highest EPSS scores. Focus on what attackers are actually targeting.

Start Monitoring Free