Most Exploitable CVEs - EPSS Rankings

CVEs ranked by EPSS (Exploit Prediction Scoring System) probability. Higher scores mean a greater likelihood of exploitation in the wild within the next 30 days.

164
EPSS > 50%
156
CISA KEV Listed
35,468
CVEs with EPSS
0.7%
Avg EPSS Score
All Critical High Medium Low
Rank CVE ID EPSS Score Percentile CVSS Flags Summary
8451 CVE-2025-24527
0.13%
32.5th 8.0 An admin with knowledge of another tenant's 128-bit connector GUID can execute debug commands on tha
8452 CVE-2024-57683
0.13%
32.6th 4.3 This vulnerability allows unauthenticated attackers to modify URL filter settings on affected D-Link
8453 CVE-2024-52813
0.13%
32.5th 4.3 This vulnerability in matrix-rust-sdk's crypto crate fails to notify applications when a user's veri
8454 CVE-2024-45547
0.13%
32.6th 7.8 This vulnerability allows memory corruption through a specific IOCTL call when processing FIPS encry
8455 CVE-2024-56244
0.13%
32.5th 5.4 This CVE describes a Missing Authorization vulnerability in the WP Royal Ashe Extra WordPress plugin
8456 CVE-2025-2869
0.13%
32.5th 6.1 This CVE describes a reflected Cross-Site Scripting (XSS) vulnerability in the Clinic Queuing System
8457 CVE-2025-30867
0.13%
32.5th 6.5 This vulnerability allows attackers to inject malicious scripts into web pages generated by the Sear
8458 CVE-2025-2820
0.13%
32.6th 6.5 An authenticated attacker can cause a denial-of-service condition on affected Bizerba devices via ne
8459 CVE-2025-2241
0.13%
32.5th 8.2 This vulnerability exposes VCenter credentials in ClusterProvision objects within Hive (part of Mult
8460 CVE-2025-27601
0.13%
32.5th 4.3 An improper API access control vulnerability in Umbraco CMS allows authenticated users with low priv
8461 CVE-2025-1260
0.13%
32.4th 9.1 This vulnerability allows unauthorized gNOI requests to bypass security controls on Arista EOS devic
8462 CVE-2025-1840
0.13%
32.5th 7.3 This critical SQL injection vulnerability in ESAFENET CDG allows remote attackers to execute arbitra
8463 CVE-2025-43954
0.13%
32.5th 4.9 QMarkdown (quasar-ui-qmarkdown) versions before 2.0.5 contain a cross-site scripting (XSS) vulnerabi
8464 CVE-2025-26998
0.13%
32.5th 6.5 This stored cross-site scripting (XSS) vulnerability in the SKT Blocks WordPress plugin allows attac
8465 CVE-2024-49708
0.13%
32.5th 5.4 This stored XSS vulnerability in SoftCOM iKSORIS Internet Starter module allows attackers to inject
8466 CVE-2025-32198
0.13%
32.5th 6.5 This is a cross-site scripting (XSS) vulnerability in the Brizy WordPress plugin that allows attacke
8467 CVE-2019-16536
0.13%
32.5th 8.8 A stack overflow vulnerability in ClickHouse allows authenticated malicious clients to trigger denia
8468 CVE-2025-4260
0.13%
32.5th 4.3 This vulnerability in Youkefu up to version 4.2.0 allows remote attackers to execute arbitrary code
8469 CVE-2025-6533
0.13%
32.6th 5.6 This vulnerability allows attackers to bypass authentication in novel-plus by replaying CAPTCHA toke
8470 CVE-2025-41663
0.13%
32.5th 9.8 This critical vulnerability in u-link Management API allows unauthenticated attackers in man-in-the-
8471 CVE-2025-32458
0.13%
32.6th 7.7 This vulnerability allows local attackers to execute arbitrary commands on systems using Quantenna W
8472 CVE-2025-32456
0.13%
32.6th 7.7 This vulnerability allows local attackers to execute arbitrary commands on systems using Quantenna W
8473 CVE-2025-49313
0.13%
32.4th 7.5 This vulnerability allows attackers to include local files on the server through improper filename c
8474 CVE-2025-49307
0.13%
32.4th 7.5 This vulnerability allows attackers to include local files on the server through improper filename c
8475 CVE-2025-30999
0.13%
32.4th 7.5 This vulnerability allows attackers to include local files on the server through improper filename c
8476 CVE-2023-25995
0.13%
32.4th 7.5 This vulnerability allows attackers to include local files on the server through improper filename c
8477 CVE-2025-48002
0.13%
32.5th 5.7 An integer overflow vulnerability in Windows Hyper-V allows authenticated attackers on adjacent netw
8478 CVE-2025-35113
0.13%
32.5th 5.9 Agiloft Release 28 contains a template injection vulnerability in its EUI template engine that allow
8479 CVE-2025-49759
0.13%
32.5th 8.8 This SQL injection vulnerability in Microsoft SQL Server allows authenticated attackers to execute a
8480 CVE-2025-8059
0.13%
32.5th 9.8 The B Blocks WordPress plugin has a critical privilege escalation vulnerability that allows unauthen
8481 CVE-2025-10954
0.13%
32.6th 5.3 The github.com/nyaruka/phonenumbers package versions before 1.2.2 contain an input validation vulner
8482 CVE-2025-40795
0.13%
32.6th 9.8 A stack-based buffer overflow vulnerability in Siemens SIMATIC PCS neo's User Management Component a
8483 CVE-2025-12394
0.13%
32.5th 5.9 The Backup Migration WordPress plugin before version 2.0.0 has an information disclosure vulnerabili
8484 CVE-2025-69256
0.13%
32.6th 7.5 A command injection vulnerability in Serverless Framework's experimental MCP server feature allows a
8485 CVE-2025-34457
0.13%
32.5th N/A A stack-based buffer overflow vulnerability in Dire Wolf's KISS frame processing allows remote unaut
8486 CVE-2025-12077
0.13%
32.5th 6.1 The WP to LinkedIn Auto Publish WordPress plugin contains a reflected cross-site scripting (XSS) vul
8487 CVE-2025-14138
0.13%
32.5th 6.1 The WPLG Default Mail From WordPress plugin contains a reflected cross-site scripting vulnerability
8488 CVE-2025-14132
0.13%
32.5th 6.1 The Category Dropdown List WordPress plugin contains a reflected cross-site scripting (XSS) vulnerab
8489 CVE-2025-14125
0.13%
32.5th 6.1 The Complag WordPress plugin up to version 1.0.2 contains a reflected cross-site scripting (XSS) vul
8490 CVE-2025-13988
0.13%
32.5th 6.1 The 评论小秘书 WordPress plugin has a reflected cross-site scripting vulnerability that allows
8491 CVE-2025-13892
0.13%
32.5th 6.1 The MG AdvancedOptions WordPress plugin contains a reflected cross-site scripting (XSS) vulnerabilit
8492 CVE-2025-13701
0.13%
32.5th 6.1 The Shabat Keeper WordPress plugin contains a reflected cross-site scripting (XSS) vulnerability tha
8493 CVE-2025-13895
0.13%
32.5th 6.1 The Top Position Google Finance WordPress plugin has a reflected cross-site scripting vulnerability
8494 CVE-2025-14130
0.13%
32.5th 6.1 The Post Like Dislike WordPress plugin contains a reflected cross-site scripting (XSS) vulnerability
8495 CVE-2026-1246
0.13%
32.4th 4.9 The ShortPixel Image Optimizer WordPress plugin contains a path traversal vulnerability that allows
8496 CVE-2025-59818
0.13%
32.6th 10.0 This vulnerability allows authenticated attackers to execute arbitrary system commands by manipulati
8497 CVE-2025-22150
0.13%
32.3th 6.8 This vulnerability in Undici's multipart/form-data boundary generation allows attackers to predict a
8498 CVE-2022-22363
0.13%
32.4th 4.3 CVE-2022-22363 is an information disclosure vulnerability in IBM Cognos Controller and IBM Controlle
8499 CVE-2024-11496
0.13%
32.4th 6.5 The Infility Global WordPress plugin has a missing capability check that allows authenticated users
8500 CVE-2025-24386
0.13%
32.4th 7.8 This CVE describes an OS command injection vulnerability in Dell Unity storage systems. A low-privil

What is EPSS?

The Exploit Prediction Scoring System (EPSS) is a data-driven model developed by FIRST.org that estimates the probability a CVE will be exploited in the wild within the next 30 days. Unlike CVSS which measures severity, EPSS measures likelihood of exploitation — making it ideal for prioritizing which vulnerabilities to patch first.

Why EPSS matters: With thousands of CVEs published monthly, not all vulnerabilities are equally dangerous. EPSS helps security teams focus on the CVEs most likely to be actively exploited, rather than patching solely by CVSS score. A critical CVSS 9.8 vulnerability with 0.1% EPSS may be less urgent than a high CVSS 7.5 with 90% EPSS.

Prioritize by Exploit Risk

Scan your servers and see which vulnerabilities have the highest EPSS scores. Focus on what attackers are actually targeting.

Start Monitoring Free