Most Exploitable CVEs - EPSS Rankings

CVEs ranked by EPSS (Exploit Prediction Scoring System) probability. Higher scores mean a greater likelihood of exploitation in the wild within the next 30 days.

164
EPSS > 50%
156
CISA KEV Listed
35,468
CVEs with EPSS
0.7%
Avg EPSS Score
All Critical High Medium Low
Rank CVE ID EPSS Score Percentile CVSS Flags Summary
8401 CVE-2025-41750
0.13%
32.8th 7.1 An unauthenticated cross-site scripting (XSS) vulnerability in pxc_PortCfg.php allows attackers to t
8402 CVE-2025-41748
0.13%
32.8th 7.1 An unauthenticated cross-site scripting (XSS) vulnerability in pxc_Dot1xCfg.php allows attackers to
8403 CVE-2025-41747
0.13%
32.8th 7.1 An unauthenticated cross-site scripting (XSS) vulnerability in pxc_vlanIntfCfg.php allows attackers
8404 CVE-2025-41746
0.13%
32.8th 7.1 An unauthenticated cross-site scripting (XSS) vulnerability in pxc_portSecCfg.php allows attackers t
8405 CVE-2025-41694
0.13%
32.9th 6.5 A low-privileged remote attacker can send a webshell request with an empty command containing whites
8406 CVE-2025-66399
0.13%
32.9th 8.8 This vulnerability allows authenticated Cacti users to inject malicious SNMP community strings conta
8407 CVE-2025-14741
0.13%
32.8th 9.1 The Frontend Admin by DynamiApps WordPress plugin has an authorization bypass vulnerability that all
8408 CVE-2026-21675
0.13%
32.9th 9.8 CVE-2026-21675 is a use-after-free vulnerability in iccDEV's CIccXform::Create() function that can l
8409 CVE-2024-40676
0.13%
32.7th 7.7 This Android vulnerability allows attackers to bypass intent security checks in AccountManagerServic
8410 CVE-2024-57041
0.13%
32.6th 4.6 A persistent cross-site scripting (XSS) vulnerability in NodeBB v3.11.0 allows authenticated users t
8411 CVE-2025-24728
0.13%
32.7th 8.5 This SQL injection vulnerability in the Bug Library WordPress plugin allows attackers to execute arb
8412 CVE-2025-0563
0.13%
32.6th 6.3 CVE-2025-0563 is a critical SQL injection vulnerability in Fantasy-Cricket 1.0 that allows remote at
8413 CVE-2025-0561
0.13%
32.6th 6.3 This critical SQL injection vulnerability in itsourcecode Farm Management System 1.0 allows remote a
8414 CVE-2025-23911
0.13%
32.7th 8.5 This SQL injection vulnerability in the Solidres Hotel Booking WordPress plugin allows attackers to
8415 CVE-2025-23785
0.13%
32.7th 4.3 This CVE describes a missing authorization vulnerability in the August Infotech AI Responsive Galler
8416 CVE-2025-0299
0.13%
32.6th 6.3 A critical SQL injection vulnerability in code-projects Online Book Shop 1.0 allows remote attackers
8417 CVE-2025-0298
0.13%
32.6th 6.3 CVE-2025-0298 is a critical SQL injection vulnerability in code-projects Online Book Shop 1.0 that a
8418 CVE-2025-25945
0.13%
32.6th 6.5 This vulnerability in Bento4 v1.6.0-641 allows attackers to read sensitive information from memory t
8419 CVE-2025-25942
0.13%
32.6th 6.5 A memory leak vulnerability in Bento4's mp4fragment tool allows attackers to cause information discl
8420 CVE-2025-1228
0.13%
32.7th 4.3 This vulnerability allows remote attackers to perform path traversal attacks in olajowon Loggrove's
8421 CVE-2025-25203
0.13%
32.6th 8.1 This Cross-Site Scripting (XSS) vulnerability in CtrlPanel allows attackers to inject malicious scri
8422 CVE-2025-1113
0.13%
32.6th 6.3 This critical vulnerability in tarzan-cms allows remote attackers to execute arbitrary code through
8423 CVE-2025-1703
0.13%
32.6th 6.4 The Ultimate Blocks WordPress plugin has a stored XSS vulnerability that allows authenticated attack
8424 CVE-2025-22474
0.13%
32.6th 6.8 This CVE describes a Server-Side Request Forgery (SSRF) vulnerability in Dell SmartFabric OS10 Softw
8425 CVE-2024-11640
0.13%
32.7th 8.8 The VikRentCar WordPress plugin has a CSRF vulnerability that allows attackers to escalate privilege
8426 CVE-2025-46342
0.13%
32.7th 8.5 This vulnerability in Kyverno allows attackers with Kubernetes API access to bypass security-critica
8427 CVE-2025-45835
0.13%
32.7th 7.5 A null pointer dereference vulnerability in Netis WF2880 routers allows attackers to cause denial-of
8428 CVE-2025-49454
0.13%
32.6th 8.1 This CVE describes a PHP Local File Inclusion vulnerability in the TinySalt WordPress theme. Attacke
8429 CVE-2025-48126
0.13%
32.6th 8.1 This vulnerability allows attackers to include local files on the server through improper filename c
8430 CVE-2025-28992
0.13%
32.6th 8.1 This vulnerability allows attackers to include local files on the server through improper filename c
8431 CVE-2025-28944
0.13%
32.6th 8.1 This vulnerability allows attackers to include local files on the server through improper filename c
8432 CVE-2025-27362
0.13%
32.6th 8.1 This vulnerability allows attackers to include local files on the server through improper filename c
8433 CVE-2025-24770
0.13%
32.6th 8.1 This vulnerability allows attackers to include local files on the server through improper filename c
8434 CVE-2023-25999
0.13%
32.6th 8.1 This vulnerability allows attackers to include local files on the server through improper filename c
8435 CVE-2025-47586
0.13%
32.6th 9.0 This CVE describes an unauthenticated Local File Inclusion vulnerability in the WordPress Motors - E
8436 CVE-2025-54365
0.13%
32.7th 7.5 CVE-2025-54365 is a regular expression denial-of-service (ReDoS) vulnerability in fastapi-guard vers
8437 CVE-2025-52379
0.13%
32.7th 5.4 This vulnerability allows authenticated attackers to execute arbitrary operating system commands on
8438 CVE-2025-57767
0.13%
32.6th 7.5 This vulnerability in Asterisk allows remote attackers to cause a denial of service (crash) by sendi
8439 CVE-2025-53037
0.13%
32.7th 9.8 An unauthenticated remote code execution vulnerability in Oracle Financial Services Analytical Appli
8440 CVE-2025-54805
0.13%
32.7th 6.5 This vulnerability in F5 BIG-IP systems causes memory resource exhaustion in the Traffic Management
8441 CVE-2025-47150
0.13%
32.7th 6.5 This vulnerability allows attackers to send specific SNMP requests to F5OS Appliance and Chassis sys
8442 CVE-2025-47148
0.13%
32.7th 6.5 This vulnerability affects BIG-IP systems configured as both SAML service provider and identity prov
8443 CVE-2025-55693
0.13%
32.7th 7.4 This CVE describes a use-after-free vulnerability in the Windows Kernel that allows a local attacker
8444 CVE-2025-55681
0.13%
32.7th 7.0 This vulnerability allows an authorized attacker to perform an out-of-bounds read in Windows Desktop
8445 CVE-2025-60833
0.13%
32.6th 6.5 This XML External Entity (XXE) vulnerability in the uzy-ssm-mall e-commerce platform allows attacker
8446 CVE-2025-61588
0.13%
32.7th N/A This vulnerability in RISC Zero's zkVM platform allows a malicious host to write arbitrary data to g
8447 CVE-2025-63807
0.13%
32.6th 9.8 This vulnerability allows unauthenticated attackers to brute-force verification codes due to weak ge
8448 CVE-2025-11994
0.13%
32.6th 7.2 The Easy Email Subscription WordPress plugin has a stored XSS vulnerability in the 'name' parameter
8449 CVE-2025-12967
0.13%
32.6th 8.0 This vulnerability in AWS Wrappers for Amazon Aurora PostgreSQL allows low-privilege authenticated d
8450 CVE-2026-1162
0.13%
32.7th 9.8 This vulnerability allows remote attackers to execute arbitrary code on UTT HiPER 810 routers by exp

What is EPSS?

The Exploit Prediction Scoring System (EPSS) is a data-driven model developed by FIRST.org that estimates the probability a CVE will be exploited in the wild within the next 30 days. Unlike CVSS which measures severity, EPSS measures likelihood of exploitation — making it ideal for prioritizing which vulnerabilities to patch first.

Why EPSS matters: With thousands of CVEs published monthly, not all vulnerabilities are equally dangerous. EPSS helps security teams focus on the CVEs most likely to be actively exploited, rather than patching solely by CVSS score. A critical CVSS 9.8 vulnerability with 0.1% EPSS may be less urgent than a high CVSS 7.5 with 90% EPSS.

Prioritize by Exploit Risk

Scan your servers and see which vulnerabilities have the highest EPSS scores. Focus on what attackers are actually targeting.

Start Monitoring Free