Most Exploitable CVEs - EPSS Rankings
CVEs ranked by EPSS (Exploit Prediction Scoring System) probability. Higher scores mean a greater likelihood of exploitation in the wild within the next 30 days.
| Rank | CVE ID | EPSS Score | Percentile | CVSS | Flags | Summary |
|---|---|---|---|---|---|---|
| 8801 | CVE-2025-68388 |
|
31.7th | 5.3 | This vulnerability in Packetbeat allows unauthenticated remote attackers to send malicious IPv4 frag | |
| 8802 | CVE-2025-9207 |
|
31.6th | 5.3 | The TI WooCommerce Wishlist plugin for WordPress is vulnerable to HTML injection, allowing unauthent | |
| 8803 | CVE-2025-13214 |
|
31.6th | 7.6 | CVE-2025-13214 is a SQL injection vulnerability in IBM Aspera Orchestrator that allows remote attack | |
| 8804 | CVE-2025-9014 |
|
31.6th | 7.5 | A remote, unauthenticated attacker can exploit a null pointer dereference vulnerability in the TP-Li | |
| 8805 | CVE-2026-22699 |
|
31.6th | 7.5 | This vulnerability in RustCrypto's elliptic-curves library allows attackers to cause denial-of-servi | |
| 8806 | CVE-2025-69425 |
|
31.6th | N/A | This vulnerability allows attackers to execute arbitrary operating system commands with root privile | |
| 8807 | CVE-2025-52872 |
|
31.7th | 8.1 | A buffer overflow vulnerability in QNAP operating systems allows authenticated remote attackers to m | |
| 8808 | CVE-2025-52864 |
|
31.7th | 8.1 | A buffer overflow vulnerability in QNAP operating systems allows authenticated remote attackers to m | |
| 8809 | CVE-2025-52863 |
|
31.7th | 8.1 | A buffer overflow vulnerability in QNAP operating systems allows authenticated remote attackers to m | |
| 8810 | CVE-2025-13379 |
|
31.7th | 8.6 | CVE-2025-13379 is a SQL injection vulnerability in IBM Aspera Console versions 3.4.0 through 3.4.8 t | |
| 8811 | CVE-2026-0617 |
|
31.6th | 7.2 | This stored XSS vulnerability in the LatePoint WordPress plugin allows unauthenticated attackers to | |
| 8812 | CVE-2025-24733 |
|
31.5th | 6.5 | This CVE describes a PHP Local File Inclusion vulnerability in the Post Grid Master WordPress plugin | |
| 8813 | CVE-2025-24672 |
|
31.6th | 8.5 | This SQL injection vulnerability in the Form Builder CP WordPress plugin allows attackers to execute | |
| 8814 | CVE-2025-24669 |
|
31.6th | 8.5 | This SQL injection vulnerability in the SERPed.net WordPress plugin allows attackers to execute arbi | |
| 8815 | CVE-2025-23910 |
|
31.6th | 8.5 | This SQL injection vulnerability in the WordPress Menus Plus+ plugin allows attackers to execute arb | |
| 8816 | CVE-2025-23913 |
|
31.6th | 8.5 | This SQL injection vulnerability in the WordPress Google Map Professional plugin allows attackers to | |
| 8817 | CVE-2025-23912 |
|
31.6th | 8.5 | This SQL injection vulnerability in the WordPress Custom Sidebar plugin allows attackers to execute | |
| 8818 | CVE-2025-22799 |
|
31.6th | 8.5 | This SQL injection vulnerability in Vertim Coders Neon Product Designer for WooCommerce allows attac | |
| 8819 | CVE-2025-21278 |
|
31.5th | 6.2 | This vulnerability in Windows Remote Desktop Gateway allows attackers to cause a denial of service b | |
| 8820 | CVE-2024-13171 |
|
31.5th | 7.8 | This vulnerability allows remote unauthenticated attackers to execute arbitrary code on Ivanti Endpo | |
| 8821 | CVE-2024-13247 |
|
31.6th | 4.8 | This vulnerability allows attackers to inject malicious scripts into web pages generated by Drupal C | |
| 8822 | CVE-2025-22537 |
|
31.6th | 8.5 | This SQL injection vulnerability in the Google Maps Travel Route WordPress plugin allows attackers t | |
| 8823 | CVE-2025-22535 |
|
31.6th | 8.5 | This SQL injection vulnerability in the WPListCal WordPress plugin allows attackers to execute arbit | |
| 8824 | CVE-2025-22519 |
|
31.6th | 8.5 | This SQL injection vulnerability in eDoc Intelligence LLC's eDoc Easy Tables WordPress plugin allows | |
| 8825 | CVE-2025-22348 |
|
31.6th | 8.5 | This SQL injection vulnerability in the DynamicTags WordPress plugin allows attackers to execute arb | |
| 8826 | CVE-2025-21612 |
|
31.5th | 8.6 | This is a cross-site scripting (XSS) vulnerability in the TabberNeue MediaWiki extension that allows | |
| 8827 | CVE-2024-20148 |
|
31.5th | 9.8 | This vulnerability allows remote attackers to execute arbitrary code on affected devices via Wi-Fi w | |
| 8828 | CVE-2024-39623 |
|
31.5th | 8.8 | A Cross-Site Request Forgery (CSRF) vulnerability in the ListingPro WordPress theme allows attackers | |
| 8829 | CVE-2025-26915 |
|
31.6th | 8.5 | This SQL injection vulnerability in the PickPlugins Wishlist WordPress plugin allows attackers to ex | |
| 8830 | CVE-2025-27312 |
|
31.6th | 8.5 | This SQL injection vulnerability in the Jenst WP Sitemap WordPress plugin allows attackers to execut | |
| 8831 | CVE-2025-22639 |
|
31.6th | 8.5 | This SQL injection vulnerability in the Distance Rate Shipping for WooCommerce plugin allows attacke | |
| 8832 | CVE-2025-26520 |
|
31.4th | 7.6 | CVE-2025-26520 is an SQL injection vulnerability in Cacti's host_templates.php file via the graph_te | |
| 8833 | CVE-2025-25151 |
|
31.6th | 8.5 | This SQL injection vulnerability in the uListing WordPress plugin allows attackers to execute arbitr | |
| 8834 | CVE-2025-24648 |
|
31.5th | 7.5 | This vulnerability allows attackers to escalate privileges in WordPress sites using the Admin and Si | |
| 8835 | CVE-2024-43333 |
|
31.5th | 7.5 | This CVE describes a privilege escalation vulnerability in the Admin and Site Enhancements (ASE) Pro | |
| 8836 | CVE-2025-28939 |
|
31.6th | 8.5 | This SQL injection vulnerability in the WP Google Calendar Manager WordPress plugin allows attackers | |
| 8837 | CVE-2025-27281 |
|
31.6th | 8.5 | This SQL injection vulnerability in the All In Menu WordPress plugin allows attackers to execute arb | |
| 8838 | CVE-2025-26976 |
|
31.6th | 8.5 | This SQL injection vulnerability in the PrivateContent WordPress plugin allows attackers to execute | |
| 8839 | CVE-2024-11216 |
|
31.5th | 7.6 | This vulnerability in PozitifIK Pik Online allows attackers to bypass authorization controls and acc | |
| 8840 | CVE-2025-27263 |
|
31.6th | 8.5 | This SQL injection vulnerability in the Doctor Appointment Booking WordPress plugin allows attackers | |
| 8841 | CVE-2025-46338 |
|
31.5th | 6.1 | Audiobookshelf versions before 2.21.0 contain a reflected cross-site scripting (XSS) vulnerability i | |
| 8842 | CVE-2025-3845 |
|
31.4th | 7.3 | A critical buffer overflow vulnerability in markparticle WebServer up to version 1.0 allows remote a | |
| 8843 | CVE-2025-1456 |
|
31.5th | 6.4 | This stored XSS vulnerability in the Royal Elementor Addons WordPress plugin allows authenticated at | |
| 8844 | CVE-2025-31726 |
|
31.5th | 5.5 | The Jenkins Stack Hammer Plugin 1.0.6 and earlier stores API keys unencrypted in job configuration f | |
| 8845 | CVE-2025-4268 |
|
31.5th | 5.3 | This vulnerability allows unauthenticated remote attackers to reboot TOTOLINK A720R routers by acces | |
| 8846 | CVE-2025-5813 |
|
31.5th | 5.3 | The Amazon Products to WooCommerce WordPress plugin has an authentication bypass vulnerability that | |
| 8847 | CVE-2025-6282 |
|
31.5th | 5.5 | This critical path traversal vulnerability in OpenAgents allows attackers to access arbitrary files | |
| 8848 | CVE-2025-6280 |
|
31.5th | 5.5 | This critical vulnerability in TransformerOptimus SuperAGI allows attackers to perform path traversa | |
| 8849 | CVE-2025-6278 |
|
31.5th | 5.5 | This critical vulnerability in Upsonic allows attackers to perform path traversal attacks by manipul | |
| 8850 | CVE-2025-28388 |
|
31.5th | 9.8 | OpenC3 COSMOS versions before v6.0.2 contain hardcoded credentials for a Service Account, allowing a |
What is EPSS?
The Exploit Prediction Scoring System (EPSS) is a data-driven model developed by FIRST.org that estimates the probability a CVE will be exploited in the wild within the next 30 days. Unlike CVSS which measures severity, EPSS measures likelihood of exploitation — making it ideal for prioritizing which vulnerabilities to patch first.
Why EPSS matters: With thousands of CVEs published monthly, not all vulnerabilities are equally dangerous. EPSS helps security teams focus on the CVEs most likely to be actively exploited, rather than patching solely by CVSS score. A critical CVSS 9.8 vulnerability with 0.1% EPSS may be less urgent than a high CVSS 7.5 with 90% EPSS.
Prioritize by Exploit Risk
Scan your servers and see which vulnerabilities have the highest EPSS scores. Focus on what attackers are actually targeting.
Start Monitoring Free