Most Exploitable CVEs - EPSS Rankings
CVEs ranked by EPSS (Exploit Prediction Scoring System) probability. Higher scores mean a greater likelihood of exploitation in the wild within the next 30 days.
| Rank | CVE ID | EPSS Score | Percentile | CVSS | Flags | Summary |
|---|---|---|---|---|---|---|
| 8451 | CVE-2025-24527 |
|
32.5th | 8.0 | An admin with knowledge of another tenant's 128-bit connector GUID can execute debug commands on tha | |
| 8452 | CVE-2024-57683 |
|
32.6th | 4.3 | This vulnerability allows unauthenticated attackers to modify URL filter settings on affected D-Link | |
| 8453 | CVE-2024-52813 |
|
32.5th | 4.3 | This vulnerability in matrix-rust-sdk's crypto crate fails to notify applications when a user's veri | |
| 8454 | CVE-2024-45547 |
|
32.6th | 7.8 | This vulnerability allows memory corruption through a specific IOCTL call when processing FIPS encry | |
| 8455 | CVE-2024-56244 |
|
32.5th | 5.4 | This CVE describes a Missing Authorization vulnerability in the WP Royal Ashe Extra WordPress plugin | |
| 8456 | CVE-2025-2869 |
|
32.5th | 6.1 | This CVE describes a reflected Cross-Site Scripting (XSS) vulnerability in the Clinic Queuing System | |
| 8457 | CVE-2025-30867 |
|
32.5th | 6.5 | This vulnerability allows attackers to inject malicious scripts into web pages generated by the Sear | |
| 8458 | CVE-2025-2820 |
|
32.6th | 6.5 | An authenticated attacker can cause a denial-of-service condition on affected Bizerba devices via ne | |
| 8459 | CVE-2025-2241 |
|
32.5th | 8.2 | This vulnerability exposes VCenter credentials in ClusterProvision objects within Hive (part of Mult | |
| 8460 | CVE-2025-27601 |
|
32.5th | 4.3 | An improper API access control vulnerability in Umbraco CMS allows authenticated users with low priv | |
| 8461 | CVE-2025-1260 |
|
32.4th | 9.1 | This vulnerability allows unauthorized gNOI requests to bypass security controls on Arista EOS devic | |
| 8462 | CVE-2025-1840 |
|
32.5th | 7.3 | This critical SQL injection vulnerability in ESAFENET CDG allows remote attackers to execute arbitra | |
| 8463 | CVE-2025-43954 |
|
32.5th | 4.9 | QMarkdown (quasar-ui-qmarkdown) versions before 2.0.5 contain a cross-site scripting (XSS) vulnerabi | |
| 8464 | CVE-2025-26998 |
|
32.5th | 6.5 | This stored cross-site scripting (XSS) vulnerability in the SKT Blocks WordPress plugin allows attac | |
| 8465 | CVE-2024-49708 |
|
32.5th | 5.4 | This stored XSS vulnerability in SoftCOM iKSORIS Internet Starter module allows attackers to inject | |
| 8466 | CVE-2025-32198 |
|
32.5th | 6.5 | This is a cross-site scripting (XSS) vulnerability in the Brizy WordPress plugin that allows attacke | |
| 8467 | CVE-2019-16536 |
|
32.5th | 8.8 | A stack overflow vulnerability in ClickHouse allows authenticated malicious clients to trigger denia | |
| 8468 | CVE-2025-4260 |
|
32.5th | 4.3 | This vulnerability in Youkefu up to version 4.2.0 allows remote attackers to execute arbitrary code | |
| 8469 | CVE-2025-6533 |
|
32.6th | 5.6 | This vulnerability allows attackers to bypass authentication in novel-plus by replaying CAPTCHA toke | |
| 8470 | CVE-2025-41663 |
|
32.5th | 9.8 | This critical vulnerability in u-link Management API allows unauthenticated attackers in man-in-the- | |
| 8471 | CVE-2025-32458 |
|
32.6th | 7.7 | This vulnerability allows local attackers to execute arbitrary commands on systems using Quantenna W | |
| 8472 | CVE-2025-32456 |
|
32.6th | 7.7 | This vulnerability allows local attackers to execute arbitrary commands on systems using Quantenna W | |
| 8473 | CVE-2025-49313 |
|
32.4th | 7.5 | This vulnerability allows attackers to include local files on the server through improper filename c | |
| 8474 | CVE-2025-49307 |
|
32.4th | 7.5 | This vulnerability allows attackers to include local files on the server through improper filename c | |
| 8475 | CVE-2025-30999 |
|
32.4th | 7.5 | This vulnerability allows attackers to include local files on the server through improper filename c | |
| 8476 | CVE-2023-25995 |
|
32.4th | 7.5 | This vulnerability allows attackers to include local files on the server through improper filename c | |
| 8477 | CVE-2025-48002 |
|
32.5th | 5.7 | An integer overflow vulnerability in Windows Hyper-V allows authenticated attackers on adjacent netw | |
| 8478 | CVE-2025-35113 |
|
32.5th | 5.9 | Agiloft Release 28 contains a template injection vulnerability in its EUI template engine that allow | |
| 8479 | CVE-2025-49759 |
|
32.5th | 8.8 | This SQL injection vulnerability in Microsoft SQL Server allows authenticated attackers to execute a | |
| 8480 | CVE-2025-8059 |
|
32.5th | 9.8 | The B Blocks WordPress plugin has a critical privilege escalation vulnerability that allows unauthen | |
| 8481 | CVE-2025-10954 |
|
32.6th | 5.3 | The github.com/nyaruka/phonenumbers package versions before 1.2.2 contain an input validation vulner | |
| 8482 | CVE-2025-40795 |
|
32.6th | 9.8 | A stack-based buffer overflow vulnerability in Siemens SIMATIC PCS neo's User Management Component a | |
| 8483 | CVE-2025-12394 |
|
32.5th | 5.9 | The Backup Migration WordPress plugin before version 2.0.0 has an information disclosure vulnerabili | |
| 8484 | CVE-2025-69256 |
|
32.6th | 7.5 | A command injection vulnerability in Serverless Framework's experimental MCP server feature allows a | |
| 8485 | CVE-2025-34457 |
|
32.5th | N/A | A stack-based buffer overflow vulnerability in Dire Wolf's KISS frame processing allows remote unaut | |
| 8486 | CVE-2025-12077 |
|
32.5th | 6.1 | The WP to LinkedIn Auto Publish WordPress plugin contains a reflected cross-site scripting (XSS) vul | |
| 8487 | CVE-2025-14138 |
|
32.5th | 6.1 | The WPLG Default Mail From WordPress plugin contains a reflected cross-site scripting vulnerability | |
| 8488 | CVE-2025-14132 |
|
32.5th | 6.1 | The Category Dropdown List WordPress plugin contains a reflected cross-site scripting (XSS) vulnerab | |
| 8489 | CVE-2025-14125 |
|
32.5th | 6.1 | The Complag WordPress plugin up to version 1.0.2 contains a reflected cross-site scripting (XSS) vul | |
| 8490 | CVE-2025-13988 |
|
32.5th | 6.1 | The 评论小秘书 WordPress plugin has a reflected cross-site scripting vulnerability that allows | |
| 8491 | CVE-2025-13892 |
|
32.5th | 6.1 | The MG AdvancedOptions WordPress plugin contains a reflected cross-site scripting (XSS) vulnerabilit | |
| 8492 | CVE-2025-13701 |
|
32.5th | 6.1 | The Shabat Keeper WordPress plugin contains a reflected cross-site scripting (XSS) vulnerability tha | |
| 8493 | CVE-2025-13895 |
|
32.5th | 6.1 | The Top Position Google Finance WordPress plugin has a reflected cross-site scripting vulnerability | |
| 8494 | CVE-2025-14130 |
|
32.5th | 6.1 | The Post Like Dislike WordPress plugin contains a reflected cross-site scripting (XSS) vulnerability | |
| 8495 | CVE-2026-1246 |
|
32.4th | 4.9 | The ShortPixel Image Optimizer WordPress plugin contains a path traversal vulnerability that allows | |
| 8496 | CVE-2025-59818 |
|
32.6th | 10.0 | This vulnerability allows authenticated attackers to execute arbitrary system commands by manipulati | |
| 8497 | CVE-2025-22150 |
|
32.3th | 6.8 | This vulnerability in Undici's multipart/form-data boundary generation allows attackers to predict a | |
| 8498 | CVE-2022-22363 |
|
32.4th | 4.3 | CVE-2022-22363 is an information disclosure vulnerability in IBM Cognos Controller and IBM Controlle | |
| 8499 | CVE-2024-11496 |
|
32.4th | 6.5 | The Infility Global WordPress plugin has a missing capability check that allows authenticated users | |
| 8500 | CVE-2025-24386 |
|
32.4th | 7.8 | This CVE describes an OS command injection vulnerability in Dell Unity storage systems. A low-privil |
What is EPSS?
The Exploit Prediction Scoring System (EPSS) is a data-driven model developed by FIRST.org that estimates the probability a CVE will be exploited in the wild within the next 30 days. Unlike CVSS which measures severity, EPSS measures likelihood of exploitation — making it ideal for prioritizing which vulnerabilities to patch first.
Why EPSS matters: With thousands of CVEs published monthly, not all vulnerabilities are equally dangerous. EPSS helps security teams focus on the CVEs most likely to be actively exploited, rather than patching solely by CVSS score. A critical CVSS 9.8 vulnerability with 0.1% EPSS may be less urgent than a high CVSS 7.5 with 90% EPSS.
Prioritize by Exploit Risk
Scan your servers and see which vulnerabilities have the highest EPSS scores. Focus on what attackers are actually targeting.
Start Monitoring Free