Most Exploitable CVEs - EPSS Rankings
CVEs ranked by EPSS (Exploit Prediction Scoring System) probability. Higher scores mean a greater likelihood of exploitation in the wild within the next 30 days.
| Rank | CVE ID | EPSS Score | Percentile | CVSS | Flags | Summary |
|---|---|---|---|---|---|---|
| 8301 | CVE-2025-22669 |
|
12.2th | 4.3 | This CSRF vulnerability in the Awesome Event Booking WordPress plugin allows attackers to trick auth | |
| 8302 | CVE-2025-62715 |
|
12.1th | 5.4 | ClipBucket v5 versions 5.5.2-#147 and below contain a stored XSS vulnerability in the Collection tag | |
| 8303 | CVE-2025-2796 |
|
12.3th | 5.3 | Arista EOS devices with hardware IPSec support and anti-replay protection configured may forward dup | |
| 8304 | CVE-2024-7142 |
|
12.1th | 4.6 | This vulnerability affects Arista CloudVision Appliance (CVA) DCA-350E-CV models where hardware disk | |
| 8305 | CVE-2026-25566 |
|
12.2th | 5.4 | This CVE describes an authorization vulnerability in WeKan's card movement functionality. Users can | |
| 8306 | CVE-2025-14356 |
|
12.1th | 4.3 | The Ultra Addons for Contact Form 7 WordPress plugin has an authorization bypass vulnerability that | |
| 8307 | CVE-2025-15144 |
|
12.1th | 4.3 | This is a cross-site scripting (XSS) vulnerability in XunRuiCMS that allows attackers to inject mali | |
| 8308 | CVE-2025-11933 |
|
12.2th | 6.5 | A vulnerability in wolfSSL's TLS 1.3 CKS extension parsing allows remote attackers to cause denial-o | |
| 8309 | CVE-2022-50682 |
|
12.2th | 6.5 | A CRLF injection vulnerability in Kentico Xperience's routing engine allows attackers to manipulate | |
| 8310 | CVE-2025-66056 |
|
12.1th | 4.3 | This vulnerability in the Uncanny Automator WordPress plugin allows unauthorized users to retrieve e | |
| 8311 | CVE-2025-8874 |
|
12.2th | 6.4 | This vulnerability allows authenticated attackers with Contributor-level access or higher to inject | |
| 8312 | CVE-2025-70311 |
|
12.3th | 6.5 | JEEWMS 1.0 contains a SQL injection vulnerability in the /systemControl.do interface where attackers | |
| 8313 | CVE-2025-59575 |
|
12.1th | 5.0 | This vulnerability in MasterStudy LMS WordPress plugin allows unauthorized users to retrieve embedde | |
| 8314 | CVE-2025-6987 |
|
12.2th | 6.4 | The Advanced iFrame WordPress plugin has a stored XSS vulnerability that allows authenticated attack | |
| 8315 | CVE-2025-59578 |
|
12.2th | 5.8 | This vulnerability in ShopMagic for WooCommerce allows attackers to retrieve embedded sensitive data | |
| 8316 | CVE-2026-1424 |
|
12.2th | 4.7 | CVE-2026-1424 is an unrestricted file upload vulnerability in PHPGurukul News Portal 1.0's Profile P | |
| 8317 | CVE-2025-47664 |
|
12.2th | 4.4 | This SSRF vulnerability in ThimPress WP Pipes WordPress plugin allows attackers to make unauthorized | |
| 8318 | CVE-2025-48377 |
|
12.3th | 5.4 | This Cross-Site Scripting (XSS) vulnerability in DNN CMS allows attackers to inject malicious script | |
| 8319 | CVE-2025-64302 |
|
12.1th | 6.4 | This CVE describes a cross-site scripting (XSS) vulnerability in dashboard components where insuffic | |
| 8320 | CVE-2025-9500 |
|
12.2th | 6.4 | The TablePress WordPress plugin has a stored cross-site scripting vulnerability that allows authenti | |
| 8321 | CVE-2025-4133 |
|
12.2th | 5.4 | This vulnerability allows users with contributor-level permissions in WordPress to inject malicious | |
| 8322 | CVE-2025-43799 |
|
12.3th | 6.5 | This vulnerability allows remote users to access and edit content via APIs before changing their ini | |
| 8323 | CVE-2025-7732 |
|
12.2th | 6.4 | The Lazy Load for Videos WordPress plugin has a stored cross-site scripting vulnerability in version | |
| 8324 | CVE-2025-22637 |
|
12.2th | 4.3 | This CSRF vulnerability in verkkovaraani Print PDF Generator and Publisher WordPress plugin allows a | |
| 8325 | CVE-2026-24674 |
|
12.1th | 4.7 | CVE-2026-24674 is a reflected cross-site scripting vulnerability in Open eClass (formerly GUnet eCla | |
| 8326 | CVE-2025-9126 |
|
12.2th | 6.4 | The Smart Table Builder WordPress plugin has a stored XSS vulnerability in all versions up to 1.0.1. | |
| 8327 | CVE-2025-14889 |
|
12.2th | 5.4 | CVE-2025-14889 is an authorization bypass vulnerability in Campcodes Advanced Voting Management Syst | |
| 8328 | CVE-2025-37929 |
|
12.2th | 5.5 | A missing sentinel entry in ARM64 Spectre-BHB workaround arrays in the Linux kernel causes a kernel | |
| 8329 | CVE-2023-54328 |
|
12.3th | 6.5 | AimOne Video Converter 2.04 Build 103 contains a buffer overflow vulnerability in its registration f | |
| 8330 | CVE-2025-9400 |
|
12.4th | 6.3 | This vulnerability in YiFang CMS allows remote attackers to upload arbitrary files without restricti | |
| 8331 | CVE-2025-6981 |
|
12.3th | 4.3 | An incorrect authorization vulnerability in GitHub Enterprise Server allowed contractor accounts to | |
| 8332 | CVE-2025-53983 |
|
12.3th | 6.5 | This vulnerability in Crocoblock JetElements For Elementor WordPress plugin allows attackers to retr | |
| 8333 | CVE-2025-53985 |
|
12.3th | 6.5 | CVE-2025-53985 is a sensitive data exposure vulnerability in the Crocoblock JetTabs WordPress plugin | |
| 8334 | CVE-2026-24771 |
|
12.1th | 4.7 | This Cross-Site Scripting (XSS) vulnerability in Hono's ErrorBoundary component allows attackers to | |
| 8335 | CVE-2025-53987 |
|
12.3th | 6.5 | This vulnerability in Crocoblock JetMenu WordPress plugin allows attackers to retrieve embedded sens | |
| 8336 | CVE-2025-64061 |
|
12.1th | 4.3 | Primakon Pi Portal 1.0.18's /api/v2/users endpoint lacks proper access controls, allowing any authen | |
| 8337 | CVE-2025-53988 |
|
12.3th | 6.5 | This vulnerability in Crocoblock JetBlocks For Elementor WordPress plugin allows attackers to retrie | |
| 8338 | CVE-2025-53992 |
|
12.3th | 6.5 | This vulnerability in Crocoblock JetTricks WordPress plugin allows attackers to retrieve embedded se | |
| 8339 | CVE-2025-48025 |
|
12.3th | 4.3 | An improper access control vulnerability in Samsung Exynos processors allows unauthorized access to | |
| 8340 | CVE-2025-53993 |
|
12.3th | 6.5 | This vulnerability in Crocoblock's JetPopup WordPress plugin allows attackers to retrieve embedded s | |
| 8341 | CVE-2025-53998 |
|
12.3th | 6.5 | This vulnerability in Crocoblock JetWooBuilder WordPress plugin allows attackers to retrieve embedde | |
| 8342 | CVE-2025-3660 |
|
12.2th | 6.5 | This CVE describes a broken access control vulnerability in the Petlibro Smart Pet Feeder Platform t | |
| 8343 | CVE-2025-36081 |
|
12.2th | 5.3 | IBM Concert Software versions 1.0.0 through 2.0.0 contain a log injection vulnerability (CWE-117) th | |
| 8344 | CVE-2025-54685 |
|
12.3th | 6.5 | This vulnerability in the SureDash WordPress plugin allows attackers to retrieve embedded sensitive | |
| 8345 | CVE-2025-13722 |
|
12th | 5.3 | This vulnerability allows authenticated WordPress users with Subscriber-level access or higher to cr | |
| 8346 | CVE-2022-49597 |
|
12th | 4.7 | This CVE describes a race condition vulnerability in the Linux kernel's TCP implementation where con | |
| 8347 | CVE-2025-67562 |
|
12.1th | 5.3 | This CVE describes a missing authorization vulnerability in the Image Caption Hover Pro WordPress pl | |
| 8348 | CVE-2025-67563 |
|
12.1th | 5.3 | This CVE describes a Missing Authorization vulnerability in the Post SMTP WordPress plugin that allo | |
| 8349 | CVE-2025-5589 |
|
11.9th | 6.4 | This stored XSS vulnerability in the StreamWeasels Kick Integration WordPress plugin allows authenti | |
| 8350 | CVE-2025-3218 |
|
11.8th | 5.4 | IBM i Netserver has authentication and authorization validation flaws that could allow attackers to |
What is EPSS?
The Exploit Prediction Scoring System (EPSS) is a data-driven model developed by FIRST.org that estimates the probability a CVE will be exploited in the wild within the next 30 days. Unlike CVSS which measures severity, EPSS measures likelihood of exploitation — making it ideal for prioritizing which vulnerabilities to patch first.
Why EPSS matters: With thousands of CVEs published monthly, not all vulnerabilities are equally dangerous. EPSS helps security teams focus on the CVEs most likely to be actively exploited, rather than patching solely by CVSS score. A critical CVSS 9.8 vulnerability with 0.1% EPSS may be less urgent than a high CVSS 7.5 with 90% EPSS.
Prioritize by Exploit Risk
Scan your servers and see which vulnerabilities have the highest EPSS scores. Focus on what attackers are actually targeting.
Start Monitoring Free