Most Exploitable CVEs - EPSS Rankings

CVEs ranked by EPSS (Exploit Prediction Scoring System) probability. Higher scores mean a greater likelihood of exploitation in the wild within the next 30 days.

164
EPSS > 50%
156
CISA KEV Listed
35,468
CVEs with EPSS
0.7%
Avg EPSS Score
All Critical High Medium Low
Rank CVE ID EPSS Score Percentile CVSS Flags Summary
8701 CVE-2025-66410
0.13%
32th 9.1 CVE-2025-66410 is a path traversal vulnerability in gin-vue-admin that allows attackers to delete ar
8702 CVE-2025-24689
0.12%
31.8th 5.9 The Import and export users and customers WordPress plugin versions up to 1.27.12 contains a vulnera
8703 CVE-2022-4975
0.12%
31.8th 8.9 This vulnerability allows attackers to execute arbitrary JavaScript code in the Red Hat Advanced Clu
8704 CVE-2024-11874
0.12%
31.8th 6.4 The Grid Accordion Lite WordPress plugin has a stored XSS vulnerability in all versions up to 1.5.1.
8705 CVE-2024-13291
0.12%
31.8th 7.3 This vulnerability in Drupal's Basic HTTP Authentication module allows attackers to bypass authoriza
8706 CVE-2024-11899
0.12%
31.8th 6.4 The Slider Pro Lite WordPress plugin has a stored cross-site scripting (XSS) vulnerability in all ve
8707 CVE-2024-41768
0.12%
31.8th 6.5 This vulnerability in IBM Engineering Lifecycle Optimization - Publishing allows remote attackers to
8708 CVE-2023-47180
0.12%
31.8th 6.5 CVE-2023-47180 is a missing authorization vulnerability in the Finale Lite WordPress plugin that all
8709 CVE-2023-46644
0.12%
31.8th 6.5 This CVE describes a Missing Authorization vulnerability in the WP CTA PRO WordPress plugin that all
8710 CVE-2024-53310
0.12%
31.8th 5.5 A buffer overflow vulnerability in Effectmatrix Total Video Converter Command Line (TVCC) version 2.
8711 CVE-2025-24861
0.12%
31.8th 7.5 This vulnerability allows remote attackers to execute arbitrary commands on affected systems by send
8712 CVE-2025-2837
0.12%
31.8th 8.8 A stack-based buffer overflow vulnerability in Silicon Labs Gecko OS HTTP request handling allows ne
8713 CVE-2024-57490
0.12%
31.8th 7.7 This vulnerability allows attackers to bypass authentication in Guangzhou Hongfan Technology's iOffi
8714 CVE-2024-8101
0.12%
31.8th 6.1 A stored cross-site scripting (XSS) vulnerability in aimhubio/aim version 3.23.0 allows attackers to
8715 CVE-2024-12766
0.12%
31.7th 7.5 This SSRF vulnerability in parisneo/lollms-webui allows attackers to make the server send unauthoriz
8716 CVE-2024-12068
0.12%
31.7th 7.5 This Server-Side Request Forgery (SSRF) vulnerability in haotian-liu/llava allows attackers to make
8717 CVE-2025-43715
0.12%
31.7th 8.1 This vulnerability allows local users on Windows systems to escalate privileges to SYSTEM during NSI
8718 CVE-2025-22111
0.12%
31.8th 5.5 A race condition vulnerability in the Linux kernel's bridge networking subsystem allows concurrent b
8719 CVE-2025-32275
0.12%
31.8th 4.3 This vulnerability allows attackers to bypass authentication in the Ays Pro Survey Maker WordPress p
8720 CVE-2025-46265
0.12%
31.8th 8.8 CVE-2025-46265 is an improper authorization vulnerability in F5OS where remotely authenticated users
8721 CVE-2025-52921
0.12%
31.8th 9.9 This vulnerability allows authenticated attackers to achieve remote code execution on Innoshop serve
8722 CVE-2025-3365
0.12%
31.7th 9.8 CVE-2025-3365 is a path traversal vulnerability that allows attackers to access arbitrary files on v
8723 CVE-2025-6746
0.12%
31.8th 8.8 The WoodMart WordPress theme plugin contains a Local File Inclusion vulnerability in the 'layout' at
8724 CVE-2025-47696
0.12%
31.7th 8.1 This vulnerability allows unauthenticated attackers to include local files on WordPress servers runn
8725 CVE-2024-53496
0.12%
31.8th 9.8 This vulnerability allows unauthenticated attackers to bypass access controls in my-site v1.0.2.RELE
8726 CVE-2025-51539
0.12%
31.7th 5.3 EzGED3 3.5.0 has an unauthenticated arbitrary file read vulnerability that allows remote attackers t
8727 CVE-2025-58759
0.12%
31.7th 5.1 TinyEnv versions 1.0.9-1.0.10 fail to properly strip inline comments from .env file values, causing
8728 CVE-2025-11204
0.12%
31.8th 7.2 This vulnerability allows SQL injection in the RegistrationMagic WordPress plugin due to insufficien
8729 CVE-2025-11407
0.12%
31.8th 6.3 This CVE describes an OS command injection vulnerability in D-Link DI-7001 MINI routers through the
8730 CVE-2025-13318
0.12%
31.8th 5.3 The Booking Calendar Contact Form WordPress plugin has a missing authorization vulnerability that al
8731 CVE-2025-66257
0.12%
31.8th 9.1 This vulnerability allows unauthenticated attackers to delete arbitrary files in the /var/www/patch/
8732 CVE-2025-66254
0.12%
31.8th 9.1 This vulnerability allows unauthenticated attackers to delete arbitrary files from the /var/www/uplo
8733 CVE-2025-9803
0.12%
31.8th 8.8 This vulnerability allows account takeover in lunary-ai/lunary due to improper Google OAuth authenti
8734 CVE-2025-12349
0.12%
31.8th 5.3 The Icegram Express WordPress plugin has an authorization bypass vulnerability that allows unauthent
8735 CVE-2025-63994
0.12%
31.8th 9.8 An arbitrary file upload vulnerability in RichFilemanager v2.7.6 allows attackers to upload maliciou
8736 CVE-2026-25498
0.12%
31.7th 7.2 This is a Remote Code Execution vulnerability in Craft CMS that allows authenticated administrators
8737 CVE-2025-63666
0.12%
31.8th 9.8 The Tenda AC15 router firmware exposes password hashes in authentication cookies and uses weak sessi
8738 CVE-2025-64401
0.12%
31.8th 7.5 Apache OpenOffice versions through 4.1.15 contain a missing authorization vulnerability where docume
8739 CVE-2025-60722
0.12%
31.8th 6.5 A path traversal vulnerability in OneDrive for Android allows authenticated attackers to access file
8740 CVE-2025-68870
0.12%
31.8th 7.5 This vulnerability allows attackers to include local files on the server through improper filename c
8741 CVE-2025-68877
0.12%
31.8th 7.5 This CVE describes a PHP Local File Inclusion vulnerability in the CedCommerce Integration for Good
8742 CVE-2025-14273
0.12%
31.8th 7.2 This vulnerability allows unauthenticated attackers to bypass authentication in Mattermost's Jira pl
8743 CVE-2025-66910
0.12%
31.8th 6.0 Turms Server versions v0.10.0-SNAPSHOT and earlier store administrator passwords in plaintext memory
8744 CVE-2025-55895
0.12%
31.8th 9.1 This vulnerability allows unauthenticated remote attackers to bypass access controls on TOTOLINK rou
8745 CVE-2025-65828
0.12%
31.8th 6.5 An unauthenticated attacker within Bluetooth range can send BLE commands to Meatmeet devices, causin
8746 CVE-2026-1427
0.12%
31.8th 8.8 This vulnerability allows authenticated remote attackers to execute arbitrary operating system comma
8747 CVE-2026-24538
0.12%
31.8th 7.6 This CVE describes a PHP Local File Inclusion vulnerability in the Omnipress WordPress plugin. Attac
8748 CVE-2026-22229
0.12%
31.7th 7.2 This CVE describes a command injection vulnerability in TP-Link Archer BE230 routers that allows aut
8749 CVE-2026-0805
0.12%
31.8th 8.2 An input neutralization vulnerability in Crafty Controller's Backup Configuration component allows a
8750 CVE-2024-5986
0.12%
31.7th 9.1 This vulnerability in h2o-3 allows remote attackers to write arbitrary data to any file on the serve

What is EPSS?

The Exploit Prediction Scoring System (EPSS) is a data-driven model developed by FIRST.org that estimates the probability a CVE will be exploited in the wild within the next 30 days. Unlike CVSS which measures severity, EPSS measures likelihood of exploitation — making it ideal for prioritizing which vulnerabilities to patch first.

Why EPSS matters: With thousands of CVEs published monthly, not all vulnerabilities are equally dangerous. EPSS helps security teams focus on the CVEs most likely to be actively exploited, rather than patching solely by CVSS score. A critical CVSS 9.8 vulnerability with 0.1% EPSS may be less urgent than a high CVSS 7.5 with 90% EPSS.

Prioritize by Exploit Risk

Scan your servers and see which vulnerabilities have the highest EPSS scores. Focus on what attackers are actually targeting.

Start Monitoring Free