Most Exploitable CVEs - EPSS Rankings

CVEs ranked by EPSS (Exploit Prediction Scoring System) probability. Higher scores mean a greater likelihood of exploitation in the wild within the next 30 days.

164
EPSS > 50%
156
CISA KEV Listed
35,468
CVEs with EPSS
0.7%
Avg EPSS Score
All Critical High Medium Low
Rank CVE ID EPSS Score Percentile CVSS Flags Summary
8351 CVE-2025-48008
0.13%
32.9th 7.5 This vulnerability affects F5 BIG-IP systems with TCP profiles configured with Multipath TCP (MPTCP)
8352 CVE-2025-41430
0.13%
32.9th 7.5 This vulnerability in BIG-IP SSL Orchestrator allows undisclosed traffic to cause the Traffic Manage
8353 CVE-2025-10293
0.13%
32.9th 8.8 The Keyy Two Factor Authentication plugin for WordPress has a privilege escalation vulnerability tha
8354 CVE-2025-59530
0.13%
33th 7.5 A denial-of-service vulnerability in quic-go allows malicious or misbehaving QUIC servers to crash c
8355 CVE-2025-41734
0.13%
33th 9.8 This critical vulnerability allows unauthenticated remote attackers to execute arbitrary PHP files o
8356 CVE-2025-9697
0.13%
32.9th 9.8 This CVE describes a critical SQL injection vulnerability in the Ajax WooSearch WordPress plugin. Un
8357 CVE-2025-55070
0.13%
32.9th 6.5 Mattermost versions before 11 fail to enforce multi-factor authentication on WebSocket connections,
8358 CVE-2025-64281
0.13%
32.9th 9.8 This critical authentication bypass vulnerability in CentralSquare Community Development allows atta
8359 CVE-2025-64513
0.13%
33th N/A An authentication bypass vulnerability in Milvus Proxy allows unauthenticated attackers to gain full
8360 CVE-2025-47151
0.13%
32.9th 9.8 A type confusion vulnerability in Entr'ouvert Lasso's SAML parsing allows remote code execution when
8361 CVE-2025-15229
0.13%
33th 5.3 A buffer overflow vulnerability in Tenda CH22 routers allows remote attackers to cause denial of ser
8362 CVE-2026-24881
0.13%
33th 8.1 This vulnerability in GnuPG allows attackers to trigger a stack-based buffer overflow by sending spe
8363 CVE-2023-38271
0.13%
32.7th 4.3 This vulnerability in IBM Cloud Pak System allows authenticated users to access sensitive informatio
8364 CVE-2025-24552
0.13%
32.8th 5.3 This CVE describes an information disclosure vulnerability in the Paytium WordPress plugin where err
8365 CVE-2025-0635
0.13%
32.9th 7.5 CVE-2025-0635 is a denial-of-service vulnerability in M-Files Server that allows unauthenticated att
8366 CVE-2025-21509
0.13%
32.7th 6.5 This vulnerability allows authenticated attackers with low privileges to cause a denial of service (
8367 CVE-2024-56376
0.13%
32.8th 5.4 A stored cross-site scripting (XSS) vulnerability in REDCap 14.9.6's built-in messenger allows authe
8368 CVE-2024-56270
0.13%
32.8th 5.3 This CVE describes a Missing Authorization vulnerability in the WP SecureSubmit WordPress plugin tha
8369 CVE-2025-25729
0.13%
32.8th 7.5 This vulnerability allows attackers to extract hardcoded cleartext credentials from Bosscomm IF740 O
8370 CVE-2024-41335
0.13%
32.8th 7.5 This vulnerability in Draytek routers allows attackers to perform timing attacks against insecure st
8371 CVE-2025-25333
0.13%
32.8th 7.5 This vulnerability in IKEA CN iOS app version 4.13.0 allows attackers to access sensitive user infor
8372 CVE-2024-2321
0.13%
32.8th 5.6 This vulnerability allows attackers to bypass authorization in WSO2 products by using refresh tokens
8373 CVE-2024-13229
0.13%
32.8th 4.3 The Rank Math SEO WordPress plugin has an authorization vulnerability that allows authenticated user
8374 CVE-2024-50500
0.13%
32.9th 4.3 This CVE describes a Missing Authorization vulnerability in the Shortcodes and extra features for Ph
8375 CVE-2024-6829
0.13%
32.7th 9.1 This vulnerability in aimhubio/aim allows attackers to exploit insecure tarfile extraction to write
8376 CVE-2024-12778
0.13%
32.7th 7.5 This vulnerability allows attackers to cause denial of service (DoS) by making API requests for larg
8377 CVE-2024-55198
0.13%
32.8th 5.3 This vulnerability in Celk Sistemas Celk Saude v.3.1.252.1 allows remote attackers to enumerate vali
8378 CVE-2025-0151
0.13%
32.8th 8.5 This CVE describes a use-after-free vulnerability in Zoom Workplace Apps that allows authenticated u
8379 CVE-2025-1828
0.13%
32.9th 8.8 The Crypt::Random Perl package versions 1.05 through 1.55 may use the non-cryptographically secure r
8380 CVE-2025-2088
0.13%
32.8th 7.3 This critical SQL injection vulnerability in PHPGurukul Pre-School Enrollment System allows attacker
8381 CVE-2025-24345
0.13%
32.7th 6.3 A vulnerability in the Hosts functionality of ctrlX OS web application allows authenticated low-priv
8382 CVE-2024-56406
0.13%
32.7th 8.4 A heap buffer overflow vulnerability in Perl's tr operator when processing non-ASCII characters allo
8383 CVE-2025-27492
0.13%
32.7th 7.0 A race condition vulnerability in Windows Secure Channel allows authenticated attackers to elevate p
8384 CVE-2025-5298
0.13%
32.8th 7.3 This critical SQL injection vulnerability in Campcodes Online Hospital Management System 1.0 allows
8385 CVE-2025-52876
0.13%
32.9th 5.4 This vulnerability allows reflected cross-site scripting (XSS) attacks on the favoriteIcon page in J
8386 CVE-2025-5747
0.13%
32.9th 8.0 This vulnerability allows network-adjacent attackers with authentication to execute arbitrary code o
8387 CVE-2025-45777
0.13%
32.8th 9.8 This vulnerability allows attackers to bypass authentication on Chavara Matrimony Site v2.0 by explo
8388 CVE-2025-51089
0.13%
32.9th 6.5 A heap-based buffer overflow vulnerability exists in Tenda AC8V4 routers via the /goform/GetParentCo
8389 CVE-2025-1713
0.13%
32.7th 7.5 This vulnerability is a deadlock condition in Xen's interrupt remapping code for legacy PCI(-X) devi
8390 CVE-2025-55634
0.13%
32.9th 7.5 This vulnerability allows unauthenticated attackers to cause a Denial of Service (DoS) on Reolink vi
8391 CVE-2025-26438
0.13%
32.7th 8.8 This vulnerability allows attackers to bypass Bluetooth Secure Simple Pairing (SMP) authentication w
8392 CVE-2025-64103
0.13%
32.8th 9.8 This vulnerability allows attackers to bypass multi-factor authentication (MFA) in Zitadel by target
8393 CVE-2025-11517
0.13%
32.8th 7.5 The Event Tickets and Registration WordPress plugin has a payment bypass vulnerability that allows u
8394 CVE-2025-11607
0.13%
32.7th 6.3 A path traversal vulnerability in MoneyPrinterTurbo's API endpoint allows attackers to write arbitra
8395 CVE-2025-65084
0.13%
32.7th 9.8 An Out-of-Bounds Write vulnerability in Ashlar-Vellum CAD software allows attackers to execute arbit
8396 CVE-2025-12788
0.13%
32.7th 5.3 This vulnerability allows unauthenticated attackers to bypass payment requirements in the Hydra Book
8397 CVE-2025-12917
0.13%
32.8th 4.3 A denial-of-service vulnerability exists in TOZED ZLT T10/T10PLUS routers version 3.04.15. Attackers
8398 CVE-2025-15176
0.13%
32.8th 5.3 This vulnerability in Open5GS allows remote attackers to trigger a reachable assertion in the PFCP S
8399 CVE-2025-41752
0.13%
32.8th 7.1 An unauthenticated cross-site scripting (XSS) vulnerability in pxc_portSfp.php allows attackers to t
8400 CVE-2025-41751
0.13%
32.8th 7.1 An unauthenticated cross-site scripting (XSS) vulnerability in pxc_portCntr.php allows attackers to

What is EPSS?

The Exploit Prediction Scoring System (EPSS) is a data-driven model developed by FIRST.org that estimates the probability a CVE will be exploited in the wild within the next 30 days. Unlike CVSS which measures severity, EPSS measures likelihood of exploitation — making it ideal for prioritizing which vulnerabilities to patch first.

Why EPSS matters: With thousands of CVEs published monthly, not all vulnerabilities are equally dangerous. EPSS helps security teams focus on the CVEs most likely to be actively exploited, rather than patching solely by CVSS score. A critical CVSS 9.8 vulnerability with 0.1% EPSS may be less urgent than a high CVSS 7.5 with 90% EPSS.

Prioritize by Exploit Risk

Scan your servers and see which vulnerabilities have the highest EPSS scores. Focus on what attackers are actually targeting.

Start Monitoring Free