Most Exploitable CVEs - EPSS Rankings
CVEs ranked by EPSS (Exploit Prediction Scoring System) probability. Higher scores mean a greater likelihood of exploitation in the wild within the next 30 days.
| Rank | CVE ID | EPSS Score | Percentile | CVSS | Flags | Summary |
|---|---|---|---|---|---|---|
| 8351 | CVE-2025-48008 |
|
32.9th | 7.5 | This vulnerability affects F5 BIG-IP systems with TCP profiles configured with Multipath TCP (MPTCP) | |
| 8352 | CVE-2025-41430 |
|
32.9th | 7.5 | This vulnerability in BIG-IP SSL Orchestrator allows undisclosed traffic to cause the Traffic Manage | |
| 8353 | CVE-2025-10293 |
|
32.9th | 8.8 | The Keyy Two Factor Authentication plugin for WordPress has a privilege escalation vulnerability tha | |
| 8354 | CVE-2025-59530 |
|
33th | 7.5 | A denial-of-service vulnerability in quic-go allows malicious or misbehaving QUIC servers to crash c | |
| 8355 | CVE-2025-41734 |
|
33th | 9.8 | This critical vulnerability allows unauthenticated remote attackers to execute arbitrary PHP files o | |
| 8356 | CVE-2025-9697 |
|
32.9th | 9.8 | This CVE describes a critical SQL injection vulnerability in the Ajax WooSearch WordPress plugin. Un | |
| 8357 | CVE-2025-55070 |
|
32.9th | 6.5 | Mattermost versions before 11 fail to enforce multi-factor authentication on WebSocket connections, | |
| 8358 | CVE-2025-64281 |
|
32.9th | 9.8 | This critical authentication bypass vulnerability in CentralSquare Community Development allows atta | |
| 8359 | CVE-2025-64513 |
|
33th | N/A | An authentication bypass vulnerability in Milvus Proxy allows unauthenticated attackers to gain full | |
| 8360 | CVE-2025-47151 |
|
32.9th | 9.8 | A type confusion vulnerability in Entr'ouvert Lasso's SAML parsing allows remote code execution when | |
| 8361 | CVE-2025-15229 |
|
33th | 5.3 | A buffer overflow vulnerability in Tenda CH22 routers allows remote attackers to cause denial of ser | |
| 8362 | CVE-2026-24881 |
|
33th | 8.1 | This vulnerability in GnuPG allows attackers to trigger a stack-based buffer overflow by sending spe | |
| 8363 | CVE-2023-38271 |
|
32.7th | 4.3 | This vulnerability in IBM Cloud Pak System allows authenticated users to access sensitive informatio | |
| 8364 | CVE-2025-24552 |
|
32.8th | 5.3 | This CVE describes an information disclosure vulnerability in the Paytium WordPress plugin where err | |
| 8365 | CVE-2025-0635 |
|
32.9th | 7.5 | CVE-2025-0635 is a denial-of-service vulnerability in M-Files Server that allows unauthenticated att | |
| 8366 | CVE-2025-21509 |
|
32.7th | 6.5 | This vulnerability allows authenticated attackers with low privileges to cause a denial of service ( | |
| 8367 | CVE-2024-56376 |
|
32.8th | 5.4 | A stored cross-site scripting (XSS) vulnerability in REDCap 14.9.6's built-in messenger allows authe | |
| 8368 | CVE-2024-56270 |
|
32.8th | 5.3 | This CVE describes a Missing Authorization vulnerability in the WP SecureSubmit WordPress plugin tha | |
| 8369 | CVE-2025-25729 |
|
32.8th | 7.5 | This vulnerability allows attackers to extract hardcoded cleartext credentials from Bosscomm IF740 O | |
| 8370 | CVE-2024-41335 |
|
32.8th | 7.5 | This vulnerability in Draytek routers allows attackers to perform timing attacks against insecure st | |
| 8371 | CVE-2025-25333 |
|
32.8th | 7.5 | This vulnerability in IKEA CN iOS app version 4.13.0 allows attackers to access sensitive user infor | |
| 8372 | CVE-2024-2321 |
|
32.8th | 5.6 | This vulnerability allows attackers to bypass authorization in WSO2 products by using refresh tokens | |
| 8373 | CVE-2024-13229 |
|
32.8th | 4.3 | The Rank Math SEO WordPress plugin has an authorization vulnerability that allows authenticated user | |
| 8374 | CVE-2024-50500 |
|
32.9th | 4.3 | This CVE describes a Missing Authorization vulnerability in the Shortcodes and extra features for Ph | |
| 8375 | CVE-2024-6829 |
|
32.7th | 9.1 | This vulnerability in aimhubio/aim allows attackers to exploit insecure tarfile extraction to write | |
| 8376 | CVE-2024-12778 |
|
32.7th | 7.5 | This vulnerability allows attackers to cause denial of service (DoS) by making API requests for larg | |
| 8377 | CVE-2024-55198 |
|
32.8th | 5.3 | This vulnerability in Celk Sistemas Celk Saude v.3.1.252.1 allows remote attackers to enumerate vali | |
| 8378 | CVE-2025-0151 |
|
32.8th | 8.5 | This CVE describes a use-after-free vulnerability in Zoom Workplace Apps that allows authenticated u | |
| 8379 | CVE-2025-1828 |
|
32.9th | 8.8 | The Crypt::Random Perl package versions 1.05 through 1.55 may use the non-cryptographically secure r | |
| 8380 | CVE-2025-2088 |
|
32.8th | 7.3 | This critical SQL injection vulnerability in PHPGurukul Pre-School Enrollment System allows attacker | |
| 8381 | CVE-2025-24345 |
|
32.7th | 6.3 | A vulnerability in the Hosts functionality of ctrlX OS web application allows authenticated low-priv | |
| 8382 | CVE-2024-56406 |
|
32.7th | 8.4 | A heap buffer overflow vulnerability in Perl's tr operator when processing non-ASCII characters allo | |
| 8383 | CVE-2025-27492 |
|
32.7th | 7.0 | A race condition vulnerability in Windows Secure Channel allows authenticated attackers to elevate p | |
| 8384 | CVE-2025-5298 |
|
32.8th | 7.3 | This critical SQL injection vulnerability in Campcodes Online Hospital Management System 1.0 allows | |
| 8385 | CVE-2025-52876 |
|
32.9th | 5.4 | This vulnerability allows reflected cross-site scripting (XSS) attacks on the favoriteIcon page in J | |
| 8386 | CVE-2025-5747 |
|
32.9th | 8.0 | This vulnerability allows network-adjacent attackers with authentication to execute arbitrary code o | |
| 8387 | CVE-2025-45777 |
|
32.8th | 9.8 | This vulnerability allows attackers to bypass authentication on Chavara Matrimony Site v2.0 by explo | |
| 8388 | CVE-2025-51089 |
|
32.9th | 6.5 | A heap-based buffer overflow vulnerability exists in Tenda AC8V4 routers via the /goform/GetParentCo | |
| 8389 | CVE-2025-1713 |
|
32.7th | 7.5 | This vulnerability is a deadlock condition in Xen's interrupt remapping code for legacy PCI(-X) devi | |
| 8390 | CVE-2025-55634 |
|
32.9th | 7.5 | This vulnerability allows unauthenticated attackers to cause a Denial of Service (DoS) on Reolink vi | |
| 8391 | CVE-2025-26438 |
|
32.7th | 8.8 | This vulnerability allows attackers to bypass Bluetooth Secure Simple Pairing (SMP) authentication w | |
| 8392 | CVE-2025-64103 |
|
32.8th | 9.8 | This vulnerability allows attackers to bypass multi-factor authentication (MFA) in Zitadel by target | |
| 8393 | CVE-2025-11517 |
|
32.8th | 7.5 | The Event Tickets and Registration WordPress plugin has a payment bypass vulnerability that allows u | |
| 8394 | CVE-2025-11607 |
|
32.7th | 6.3 | A path traversal vulnerability in MoneyPrinterTurbo's API endpoint allows attackers to write arbitra | |
| 8395 | CVE-2025-65084 |
|
32.7th | 9.8 | An Out-of-Bounds Write vulnerability in Ashlar-Vellum CAD software allows attackers to execute arbit | |
| 8396 | CVE-2025-12788 |
|
32.7th | 5.3 | This vulnerability allows unauthenticated attackers to bypass payment requirements in the Hydra Book | |
| 8397 | CVE-2025-12917 |
|
32.8th | 4.3 | A denial-of-service vulnerability exists in TOZED ZLT T10/T10PLUS routers version 3.04.15. Attackers | |
| 8398 | CVE-2025-15176 |
|
32.8th | 5.3 | This vulnerability in Open5GS allows remote attackers to trigger a reachable assertion in the PFCP S | |
| 8399 | CVE-2025-41752 |
|
32.8th | 7.1 | An unauthenticated cross-site scripting (XSS) vulnerability in pxc_portSfp.php allows attackers to t | |
| 8400 | CVE-2025-41751 |
|
32.8th | 7.1 | An unauthenticated cross-site scripting (XSS) vulnerability in pxc_portCntr.php allows attackers to |
What is EPSS?
The Exploit Prediction Scoring System (EPSS) is a data-driven model developed by FIRST.org that estimates the probability a CVE will be exploited in the wild within the next 30 days. Unlike CVSS which measures severity, EPSS measures likelihood of exploitation — making it ideal for prioritizing which vulnerabilities to patch first.
Why EPSS matters: With thousands of CVEs published monthly, not all vulnerabilities are equally dangerous. EPSS helps security teams focus on the CVEs most likely to be actively exploited, rather than patching solely by CVSS score. A critical CVSS 9.8 vulnerability with 0.1% EPSS may be less urgent than a high CVSS 7.5 with 90% EPSS.
Prioritize by Exploit Risk
Scan your servers and see which vulnerabilities have the highest EPSS scores. Focus on what attackers are actually targeting.
Start Monitoring Free