Most Exploitable CVEs - EPSS Rankings
CVEs ranked by EPSS (Exploit Prediction Scoring System) probability. Higher scores mean a greater likelihood of exploitation in the wild within the next 30 days.
| Rank | CVE ID | EPSS Score | Percentile | CVSS | Flags | Summary |
|---|---|---|---|---|---|---|
| 8501 | CVE-2025-24385 |
|
32.3th | 7.8 | This OS command injection vulnerability in Dell Unity storage systems allows attackers with local ac | |
| 8502 | CVE-2025-24380 |
|
32.4th | 7.8 | This vulnerability allows a low-privileged attacker with local access to execute arbitrary operating | |
| 8503 | CVE-2025-24379 |
|
32.4th | 7.8 | This OS command injection vulnerability in Dell Unity storage systems allows attackers with local ac | |
| 8504 | CVE-2025-24378 |
|
32.4th | 7.8 | This CVE describes an OS command injection vulnerability in Dell Unity storage systems. A low-privil | |
| 8505 | CVE-2025-24377 |
|
32.3th | 7.8 | This CVE describes an OS command injection vulnerability in Dell Unity storage systems. A low-privil | |
| 8506 | CVE-2025-23383 |
|
32.4th | 7.8 | This OS command injection vulnerability in Dell Unity storage systems allows low-privileged local at | |
| 8507 | CVE-2024-49565 |
|
32.4th | 7.8 | This OS command injection vulnerability in Dell Unity storage systems allows low-privileged local at | |
| 8508 | CVE-2024-49564 |
|
32.4th | 7.8 | This CVE describes an OS command injection vulnerability in Dell Unity storage systems. A low-privil | |
| 8509 | CVE-2024-49563 |
|
32.4th | 7.8 | This CVE describes an OS command injection vulnerability in Dell Unity storage systems. A low-privil | |
| 8510 | CVE-2024-13801 |
|
32.3th | 8.1 | The BWL Advanced FAQ Manager WordPress plugin has an authorization vulnerability that allows authent | |
| 8511 | CVE-2025-2532 |
|
32.4th | 7.8 | This vulnerability allows remote attackers to execute arbitrary code by tricking users into opening | |
| 8512 | CVE-2025-2530 |
|
32.4th | 7.8 | This vulnerability allows remote attackers to execute arbitrary code by tricking users into opening | |
| 8513 | CVE-2024-12882 |
|
32.4th | 7.5 | ComfyUI v0.2.4 has a Server-Side Request Forgery (SSRF) vulnerability where attackers can combine tw | |
| 8514 | CVE-2025-26969 |
|
32.4th | 8.3 | This CVE describes a Missing Authorization vulnerability in the PrivateContent WordPress plugin that | |
| 8515 | CVE-2024-13655 |
|
32.3th | 8.1 | This vulnerability in the Flex Mag WordPress theme allows authenticated users with Subscriber-level | |
| 8516 | CVE-2024-47260 |
|
32.4th | 6.5 | This vulnerability in Axis devices allows attackers to upload excessive audio clips through the VAPI | |
| 8517 | CVE-2025-26153 |
|
32.4th | 5.4 | A stored cross-site scripting (XSS) vulnerability in Chamilo LMS 1.11.28 allows attackers to inject | |
| 8518 | CVE-2025-32227 |
|
32.4th | 4.3 | This vulnerability allows attackers to bypass authentication in Asgaros Forum WordPress plugin by sp | |
| 8519 | CVE-2025-3165 |
|
32.4th | 5.3 | This vulnerability allows local attackers to execute arbitrary code through unsafe deserialization i | |
| 8520 | CVE-2025-4473 |
|
32.4th | 8.8 | The Frontend Dashboard WordPress plugin versions 1.0 to 2.2.7 contain a privilege escalation vulnera | |
| 8521 | CVE-2025-20193 |
|
32.4th | 6.5 | This vulnerability allows authenticated low-privileged remote attackers to perform OS command inject | |
| 8522 | CVE-2025-4222 |
|
32.3th | 5.9 | The Database Toolset WordPress plugin stores database backup files in a publicly accessible director | |
| 8523 | CVE-2025-35975 |
|
32.4th | 8.8 | MicroDicom DICOM Viewer contains an out-of-bounds write vulnerability (CWE-787) that allows arbitrar | |
| 8524 | CVE-2025-4404 |
|
32.3th | 9.1 | This CVE describes a privilege escalation vulnerability in FreeIPA where attackers can create servic | |
| 8525 | CVE-2018-25112 |
|
32.4th | 7.5 | CVE-2018-25112 allows unauthenticated remote attackers to cause denial-of-service on affected indust | |
| 8526 | CVE-2025-26780 |
|
32.4th | 7.5 | A missing length check in Samsung Exynos 2400 and Modem 5400 chips allows attackers to cause denial | |
| 8527 | CVE-2025-29514 |
|
32.4th | 9.8 | This vulnerability allows unauthenticated attackers to download the configuration file of D-Link DSL | |
| 8528 | CVE-2025-58474 |
|
32.4th | 5.3 | This vulnerability affects BIG-IP Advanced WAF with SSRF protection or NGINX with App Protect Bot De | |
| 8529 | CVE-2025-58738 |
|
32.4th | 7.0 | CVE-2025-58738 is a use-after-free vulnerability in Inbox COM Objects that allows an unauthorized at | |
| 8530 | CVE-2025-58736 |
|
32.4th | 7.0 | This vulnerability involves a use-after-free flaw in Inbox COM Objects that allows an unauthorized a | |
| 8531 | CVE-2025-58734 |
|
32.4th | 7.0 | This vulnerability involves a use-after-free flaw in Inbox COM Objects that allows an unauthorized a | |
| 8532 | CVE-2025-58732 |
|
32.4th | 7.0 | This vulnerability involves a use-after-free flaw in Inbox COM Objects that allows an unauthorized l | |
| 8533 | CVE-2025-58730 |
|
32.4th | 7.0 | CVE-2025-58730 is a use-after-free vulnerability in Inbox COM Objects that allows an unauthorized at | |
| 8534 | CVE-2025-11380 |
|
32.4th | 5.9 | The Everest Backup WordPress plugin has an authentication bypass vulnerability that allows unauthent | |
| 8535 | CVE-2025-60313 |
|
32.4th | 6.1 | CVE-2025-60313 is a Cross-Site Scripting (XSS) vulnerability in Sourcecodester Link Status Checker 1 | |
| 8536 | CVE-2026-25895 |
|
32.4th | 9.8 | CVE-2026-25895 is a path traversal vulnerability in FUXA web-based SCADA/HMI software that allows un | |
| 8537 | CVE-2025-11578 |
|
32.3th | 7.2 | This CVE describes a privilege escalation vulnerability in GitHub Enterprise Server where authentica | |
| 8538 | CVE-2025-65570 |
|
32.3th | 9.8 | A type confusion vulnerability in jsish 2.0 allows incorrect control flow during execution of the OP | |
| 8539 | CVE-2025-68922 |
|
32.4th | 7.4 | CVE-2025-68922 is a remote code execution vulnerability in OpenOps that allows attackers to execute | |
| 8540 | CVE-2025-64054 |
|
32.4th | 9.6 | A reflected Cross-Site Scripting (XSS) vulnerability in Fanvil x210 VoIP phones running firmware ver | |
| 8541 | CVE-2026-22808 |
|
32.4th | 5.4 | This is a cross-site scripting (XSS) vulnerability in Fleet device management software that allows u | |
| 8542 | CVE-2025-10753 |
|
32.4th | 5.3 | The OAuth Single Sign On plugin for WordPress has an authentication bypass vulnerability that allows | |
| 8543 | CVE-2025-30996 |
|
32.4th | 9.9 | This vulnerability allows attackers to upload arbitrary files, including web shells, to WordPress si | |
| 8544 | CVE-2025-14461 |
|
32.4th | 5.3 | The Xendit Payment plugin for WordPress has an authentication bypass vulnerability that allows unaut | |
| 8545 | CVE-2024-12203 |
|
32.3th | 4.4 | The RSS Icon Widget plugin for WordPress has a stored cross-site scripting vulnerability in the 'lin | |
| 8546 | CVE-2024-37518 |
|
32.2th | 4.3 | This CSRF vulnerability in The Events Calendar WordPress plugin allows attackers to trick authentica | |
| 8547 | CVE-2024-37493 |
|
32.2th | 4.3 | This CSRF vulnerability in the Posterity WordPress theme allows attackers to trick authenticated adm | |
| 8548 | CVE-2024-37490 |
|
32.2th | 4.3 | A Cross-Site Request Forgery (CSRF) vulnerability in the WP Royal Bard WordPress theme allows attack | |
| 8549 | CVE-2024-37467 |
|
32.2th | 4.3 | This CSRF vulnerability in the Hestia WordPress theme allows attackers to trick authenticated admini | |
| 8550 | CVE-2024-37238 |
|
32.2th | 4.3 | This CSRF vulnerability in the WPAdverts WordPress plugin allows attackers to trick authenticated ad |
What is EPSS?
The Exploit Prediction Scoring System (EPSS) is a data-driven model developed by FIRST.org that estimates the probability a CVE will be exploited in the wild within the next 30 days. Unlike CVSS which measures severity, EPSS measures likelihood of exploitation — making it ideal for prioritizing which vulnerabilities to patch first.
Why EPSS matters: With thousands of CVEs published monthly, not all vulnerabilities are equally dangerous. EPSS helps security teams focus on the CVEs most likely to be actively exploited, rather than patching solely by CVSS score. A critical CVSS 9.8 vulnerability with 0.1% EPSS may be less urgent than a high CVSS 7.5 with 90% EPSS.
Prioritize by Exploit Risk
Scan your servers and see which vulnerabilities have the highest EPSS scores. Focus on what attackers are actually targeting.
Start Monitoring Free