Most Exploitable CVEs - EPSS Rankings
CVEs ranked by EPSS (Exploit Prediction Scoring System) probability. Higher scores mean a greater likelihood of exploitation in the wild within the next 30 days.
| Rank | CVE ID | EPSS Score | Percentile | CVSS | Flags | Summary |
|---|---|---|---|---|---|---|
| 8701 | CVE-2025-66410 |
|
32th | 9.1 | CVE-2025-66410 is a path traversal vulnerability in gin-vue-admin that allows attackers to delete ar | |
| 8702 | CVE-2025-24689 |
|
31.8th | 5.9 | The Import and export users and customers WordPress plugin versions up to 1.27.12 contains a vulnera | |
| 8703 | CVE-2022-4975 |
|
31.8th | 8.9 | This vulnerability allows attackers to execute arbitrary JavaScript code in the Red Hat Advanced Clu | |
| 8704 | CVE-2024-11874 |
|
31.8th | 6.4 | The Grid Accordion Lite WordPress plugin has a stored XSS vulnerability in all versions up to 1.5.1. | |
| 8705 | CVE-2024-13291 |
|
31.8th | 7.3 | This vulnerability in Drupal's Basic HTTP Authentication module allows attackers to bypass authoriza | |
| 8706 | CVE-2024-11899 |
|
31.8th | 6.4 | The Slider Pro Lite WordPress plugin has a stored cross-site scripting (XSS) vulnerability in all ve | |
| 8707 | CVE-2024-41768 |
|
31.8th | 6.5 | This vulnerability in IBM Engineering Lifecycle Optimization - Publishing allows remote attackers to | |
| 8708 | CVE-2023-47180 |
|
31.8th | 6.5 | CVE-2023-47180 is a missing authorization vulnerability in the Finale Lite WordPress plugin that all | |
| 8709 | CVE-2023-46644 |
|
31.8th | 6.5 | This CVE describes a Missing Authorization vulnerability in the WP CTA PRO WordPress plugin that all | |
| 8710 | CVE-2024-53310 |
|
31.8th | 5.5 | A buffer overflow vulnerability in Effectmatrix Total Video Converter Command Line (TVCC) version 2. | |
| 8711 | CVE-2025-24861 |
|
31.8th | 7.5 | This vulnerability allows remote attackers to execute arbitrary commands on affected systems by send | |
| 8712 | CVE-2025-2837 |
|
31.8th | 8.8 | A stack-based buffer overflow vulnerability in Silicon Labs Gecko OS HTTP request handling allows ne | |
| 8713 | CVE-2024-57490 |
|
31.8th | 7.7 | This vulnerability allows attackers to bypass authentication in Guangzhou Hongfan Technology's iOffi | |
| 8714 | CVE-2024-8101 |
|
31.8th | 6.1 | A stored cross-site scripting (XSS) vulnerability in aimhubio/aim version 3.23.0 allows attackers to | |
| 8715 | CVE-2024-12766 |
|
31.7th | 7.5 | This SSRF vulnerability in parisneo/lollms-webui allows attackers to make the server send unauthoriz | |
| 8716 | CVE-2024-12068 |
|
31.7th | 7.5 | This Server-Side Request Forgery (SSRF) vulnerability in haotian-liu/llava allows attackers to make | |
| 8717 | CVE-2025-43715 |
|
31.7th | 8.1 | This vulnerability allows local users on Windows systems to escalate privileges to SYSTEM during NSI | |
| 8718 | CVE-2025-22111 |
|
31.8th | 5.5 | A race condition vulnerability in the Linux kernel's bridge networking subsystem allows concurrent b | |
| 8719 | CVE-2025-32275 |
|
31.8th | 4.3 | This vulnerability allows attackers to bypass authentication in the Ays Pro Survey Maker WordPress p | |
| 8720 | CVE-2025-46265 |
|
31.8th | 8.8 | CVE-2025-46265 is an improper authorization vulnerability in F5OS where remotely authenticated users | |
| 8721 | CVE-2025-52921 |
|
31.8th | 9.9 | This vulnerability allows authenticated attackers to achieve remote code execution on Innoshop serve | |
| 8722 | CVE-2025-3365 |
|
31.7th | 9.8 | CVE-2025-3365 is a path traversal vulnerability that allows attackers to access arbitrary files on v | |
| 8723 | CVE-2025-6746 |
|
31.8th | 8.8 | The WoodMart WordPress theme plugin contains a Local File Inclusion vulnerability in the 'layout' at | |
| 8724 | CVE-2025-47696 |
|
31.7th | 8.1 | This vulnerability allows unauthenticated attackers to include local files on WordPress servers runn | |
| 8725 | CVE-2024-53496 |
|
31.8th | 9.8 | This vulnerability allows unauthenticated attackers to bypass access controls in my-site v1.0.2.RELE | |
| 8726 | CVE-2025-51539 |
|
31.7th | 5.3 | EzGED3 3.5.0 has an unauthenticated arbitrary file read vulnerability that allows remote attackers t | |
| 8727 | CVE-2025-58759 |
|
31.7th | 5.1 | TinyEnv versions 1.0.9-1.0.10 fail to properly strip inline comments from .env file values, causing | |
| 8728 | CVE-2025-11204 |
|
31.8th | 7.2 | This vulnerability allows SQL injection in the RegistrationMagic WordPress plugin due to insufficien | |
| 8729 | CVE-2025-11407 |
|
31.8th | 6.3 | This CVE describes an OS command injection vulnerability in D-Link DI-7001 MINI routers through the | |
| 8730 | CVE-2025-13318 |
|
31.8th | 5.3 | The Booking Calendar Contact Form WordPress plugin has a missing authorization vulnerability that al | |
| 8731 | CVE-2025-66257 |
|
31.8th | 9.1 | This vulnerability allows unauthenticated attackers to delete arbitrary files in the /var/www/patch/ | |
| 8732 | CVE-2025-66254 |
|
31.8th | 9.1 | This vulnerability allows unauthenticated attackers to delete arbitrary files from the /var/www/uplo | |
| 8733 | CVE-2025-9803 |
|
31.8th | 8.8 | This vulnerability allows account takeover in lunary-ai/lunary due to improper Google OAuth authenti | |
| 8734 | CVE-2025-12349 |
|
31.8th | 5.3 | The Icegram Express WordPress plugin has an authorization bypass vulnerability that allows unauthent | |
| 8735 | CVE-2025-63994 |
|
31.8th | 9.8 | An arbitrary file upload vulnerability in RichFilemanager v2.7.6 allows attackers to upload maliciou | |
| 8736 | CVE-2026-25498 |
|
31.7th | 7.2 | This is a Remote Code Execution vulnerability in Craft CMS that allows authenticated administrators | |
| 8737 | CVE-2025-63666 |
|
31.8th | 9.8 | The Tenda AC15 router firmware exposes password hashes in authentication cookies and uses weak sessi | |
| 8738 | CVE-2025-64401 |
|
31.8th | 7.5 | Apache OpenOffice versions through 4.1.15 contain a missing authorization vulnerability where docume | |
| 8739 | CVE-2025-60722 |
|
31.8th | 6.5 | A path traversal vulnerability in OneDrive for Android allows authenticated attackers to access file | |
| 8740 | CVE-2025-68870 |
|
31.8th | 7.5 | This vulnerability allows attackers to include local files on the server through improper filename c | |
| 8741 | CVE-2025-68877 |
|
31.8th | 7.5 | This CVE describes a PHP Local File Inclusion vulnerability in the CedCommerce Integration for Good | |
| 8742 | CVE-2025-14273 |
|
31.8th | 7.2 | This vulnerability allows unauthenticated attackers to bypass authentication in Mattermost's Jira pl | |
| 8743 | CVE-2025-66910 |
|
31.8th | 6.0 | Turms Server versions v0.10.0-SNAPSHOT and earlier store administrator passwords in plaintext memory | |
| 8744 | CVE-2025-55895 |
|
31.8th | 9.1 | This vulnerability allows unauthenticated remote attackers to bypass access controls on TOTOLINK rou | |
| 8745 | CVE-2025-65828 |
|
31.8th | 6.5 | An unauthenticated attacker within Bluetooth range can send BLE commands to Meatmeet devices, causin | |
| 8746 | CVE-2026-1427 |
|
31.8th | 8.8 | This vulnerability allows authenticated remote attackers to execute arbitrary operating system comma | |
| 8747 | CVE-2026-24538 |
|
31.8th | 7.6 | This CVE describes a PHP Local File Inclusion vulnerability in the Omnipress WordPress plugin. Attac | |
| 8748 | CVE-2026-22229 |
|
31.7th | 7.2 | This CVE describes a command injection vulnerability in TP-Link Archer BE230 routers that allows aut | |
| 8749 | CVE-2026-0805 |
|
31.8th | 8.2 | An input neutralization vulnerability in Crafty Controller's Backup Configuration component allows a | |
| 8750 | CVE-2024-5986 |
|
31.7th | 9.1 | This vulnerability in h2o-3 allows remote attackers to write arbitrary data to any file on the serve |
What is EPSS?
The Exploit Prediction Scoring System (EPSS) is a data-driven model developed by FIRST.org that estimates the probability a CVE will be exploited in the wild within the next 30 days. Unlike CVSS which measures severity, EPSS measures likelihood of exploitation — making it ideal for prioritizing which vulnerabilities to patch first.
Why EPSS matters: With thousands of CVEs published monthly, not all vulnerabilities are equally dangerous. EPSS helps security teams focus on the CVEs most likely to be actively exploited, rather than patching solely by CVSS score. A critical CVSS 9.8 vulnerability with 0.1% EPSS may be less urgent than a high CVSS 7.5 with 90% EPSS.
Prioritize by Exploit Risk
Scan your servers and see which vulnerabilities have the highest EPSS scores. Focus on what attackers are actually targeting.
Start Monitoring Free