Most Exploitable CVEs - EPSS Rankings

CVEs ranked by EPSS (Exploit Prediction Scoring System) probability. Higher scores mean a greater likelihood of exploitation in the wild within the next 30 days.

164
EPSS > 50%
156
CISA KEV Listed
35,468
CVEs with EPSS
0.7%
Avg EPSS Score
All Critical High Medium Low
Rank CVE ID EPSS Score Percentile CVSS Flags Summary
8501 CVE-2025-24385
0.13%
32.3th 7.8 This OS command injection vulnerability in Dell Unity storage systems allows attackers with local ac
8502 CVE-2025-24380
0.13%
32.4th 7.8 This vulnerability allows a low-privileged attacker with local access to execute arbitrary operating
8503 CVE-2025-24379
0.13%
32.4th 7.8 This OS command injection vulnerability in Dell Unity storage systems allows attackers with local ac
8504 CVE-2025-24378
0.13%
32.4th 7.8 This CVE describes an OS command injection vulnerability in Dell Unity storage systems. A low-privil
8505 CVE-2025-24377
0.13%
32.3th 7.8 This CVE describes an OS command injection vulnerability in Dell Unity storage systems. A low-privil
8506 CVE-2025-23383
0.13%
32.4th 7.8 This OS command injection vulnerability in Dell Unity storage systems allows low-privileged local at
8507 CVE-2024-49565
0.13%
32.4th 7.8 This OS command injection vulnerability in Dell Unity storage systems allows low-privileged local at
8508 CVE-2024-49564
0.13%
32.4th 7.8 This CVE describes an OS command injection vulnerability in Dell Unity storage systems. A low-privil
8509 CVE-2024-49563
0.13%
32.4th 7.8 This CVE describes an OS command injection vulnerability in Dell Unity storage systems. A low-privil
8510 CVE-2024-13801
0.13%
32.3th 8.1 The BWL Advanced FAQ Manager WordPress plugin has an authorization vulnerability that allows authent
8511 CVE-2025-2532
0.13%
32.4th 7.8 This vulnerability allows remote attackers to execute arbitrary code by tricking users into opening
8512 CVE-2025-2530
0.13%
32.4th 7.8 This vulnerability allows remote attackers to execute arbitrary code by tricking users into opening
8513 CVE-2024-12882
0.13%
32.4th 7.5 ComfyUI v0.2.4 has a Server-Side Request Forgery (SSRF) vulnerability where attackers can combine tw
8514 CVE-2025-26969
0.13%
32.4th 8.3 This CVE describes a Missing Authorization vulnerability in the PrivateContent WordPress plugin that
8515 CVE-2024-13655
0.13%
32.3th 8.1 This vulnerability in the Flex Mag WordPress theme allows authenticated users with Subscriber-level
8516 CVE-2024-47260
0.13%
32.4th 6.5 This vulnerability in Axis devices allows attackers to upload excessive audio clips through the VAPI
8517 CVE-2025-26153
0.13%
32.4th 5.4 A stored cross-site scripting (XSS) vulnerability in Chamilo LMS 1.11.28 allows attackers to inject
8518 CVE-2025-32227
0.13%
32.4th 4.3 This vulnerability allows attackers to bypass authentication in Asgaros Forum WordPress plugin by sp
8519 CVE-2025-3165
0.13%
32.4th 5.3 This vulnerability allows local attackers to execute arbitrary code through unsafe deserialization i
8520 CVE-2025-4473
0.13%
32.4th 8.8 The Frontend Dashboard WordPress plugin versions 1.0 to 2.2.7 contain a privilege escalation vulnera
8521 CVE-2025-20193
0.13%
32.4th 6.5 This vulnerability allows authenticated low-privileged remote attackers to perform OS command inject
8522 CVE-2025-4222
0.13%
32.3th 5.9 The Database Toolset WordPress plugin stores database backup files in a publicly accessible director
8523 CVE-2025-35975
0.13%
32.4th 8.8 MicroDicom DICOM Viewer contains an out-of-bounds write vulnerability (CWE-787) that allows arbitrar
8524 CVE-2025-4404
0.13%
32.3th 9.1 This CVE describes a privilege escalation vulnerability in FreeIPA where attackers can create servic
8525 CVE-2018-25112
0.13%
32.4th 7.5 CVE-2018-25112 allows unauthenticated remote attackers to cause denial-of-service on affected indust
8526 CVE-2025-26780
0.13%
32.4th 7.5 A missing length check in Samsung Exynos 2400 and Modem 5400 chips allows attackers to cause denial
8527 CVE-2025-29514
0.13%
32.4th 9.8 This vulnerability allows unauthenticated attackers to download the configuration file of D-Link DSL
8528 CVE-2025-58474
0.13%
32.4th 5.3 This vulnerability affects BIG-IP Advanced WAF with SSRF protection or NGINX with App Protect Bot De
8529 CVE-2025-58738
0.13%
32.4th 7.0 CVE-2025-58738 is a use-after-free vulnerability in Inbox COM Objects that allows an unauthorized at
8530 CVE-2025-58736
0.13%
32.4th 7.0 This vulnerability involves a use-after-free flaw in Inbox COM Objects that allows an unauthorized a
8531 CVE-2025-58734
0.13%
32.4th 7.0 This vulnerability involves a use-after-free flaw in Inbox COM Objects that allows an unauthorized a
8532 CVE-2025-58732
0.13%
32.4th 7.0 This vulnerability involves a use-after-free flaw in Inbox COM Objects that allows an unauthorized l
8533 CVE-2025-58730
0.13%
32.4th 7.0 CVE-2025-58730 is a use-after-free vulnerability in Inbox COM Objects that allows an unauthorized at
8534 CVE-2025-11380
0.13%
32.4th 5.9 The Everest Backup WordPress plugin has an authentication bypass vulnerability that allows unauthent
8535 CVE-2025-60313
0.13%
32.4th 6.1 CVE-2025-60313 is a Cross-Site Scripting (XSS) vulnerability in Sourcecodester Link Status Checker 1
8536 CVE-2026-25895
0.13%
32.4th 9.8 CVE-2026-25895 is a path traversal vulnerability in FUXA web-based SCADA/HMI software that allows un
8537 CVE-2025-11578
0.13%
32.3th 7.2 This CVE describes a privilege escalation vulnerability in GitHub Enterprise Server where authentica
8538 CVE-2025-65570
0.13%
32.3th 9.8 A type confusion vulnerability in jsish 2.0 allows incorrect control flow during execution of the OP
8539 CVE-2025-68922
0.13%
32.4th 7.4 CVE-2025-68922 is a remote code execution vulnerability in OpenOps that allows attackers to execute
8540 CVE-2025-64054
0.13%
32.4th 9.6 A reflected Cross-Site Scripting (XSS) vulnerability in Fanvil x210 VoIP phones running firmware ver
8541 CVE-2026-22808
0.13%
32.4th 5.4 This is a cross-site scripting (XSS) vulnerability in Fleet device management software that allows u
8542 CVE-2025-10753
0.13%
32.4th 5.3 The OAuth Single Sign On plugin for WordPress has an authentication bypass vulnerability that allows
8543 CVE-2025-30996
0.13%
32.4th 9.9 This vulnerability allows attackers to upload arbitrary files, including web shells, to WordPress si
8544 CVE-2025-14461
0.13%
32.4th 5.3 The Xendit Payment plugin for WordPress has an authentication bypass vulnerability that allows unaut
8545 CVE-2024-12203
0.13%
32.3th 4.4 The RSS Icon Widget plugin for WordPress has a stored cross-site scripting vulnerability in the 'lin
8546 CVE-2024-37518
0.13%
32.2th 4.3 This CSRF vulnerability in The Events Calendar WordPress plugin allows attackers to trick authentica
8547 CVE-2024-37493
0.13%
32.2th 4.3 This CSRF vulnerability in the Posterity WordPress theme allows attackers to trick authenticated adm
8548 CVE-2024-37490
0.13%
32.2th 4.3 A Cross-Site Request Forgery (CSRF) vulnerability in the WP Royal Bard WordPress theme allows attack
8549 CVE-2024-37467
0.13%
32.2th 4.3 This CSRF vulnerability in the Hestia WordPress theme allows attackers to trick authenticated admini
8550 CVE-2024-37238
0.13%
32.2th 4.3 This CSRF vulnerability in the WPAdverts WordPress plugin allows attackers to trick authenticated ad

What is EPSS?

The Exploit Prediction Scoring System (EPSS) is a data-driven model developed by FIRST.org that estimates the probability a CVE will be exploited in the wild within the next 30 days. Unlike CVSS which measures severity, EPSS measures likelihood of exploitation — making it ideal for prioritizing which vulnerabilities to patch first.

Why EPSS matters: With thousands of CVEs published monthly, not all vulnerabilities are equally dangerous. EPSS helps security teams focus on the CVEs most likely to be actively exploited, rather than patching solely by CVSS score. A critical CVSS 9.8 vulnerability with 0.1% EPSS may be less urgent than a high CVSS 7.5 with 90% EPSS.

Prioritize by Exploit Risk

Scan your servers and see which vulnerabilities have the highest EPSS scores. Focus on what attackers are actually targeting.

Start Monitoring Free