Most Exploitable CVEs - EPSS Rankings

CVEs ranked by EPSS (Exploit Prediction Scoring System) probability. Higher scores mean a greater likelihood of exploitation in the wild within the next 30 days.

164
EPSS > 50%
156
CISA KEV Listed
35,468
CVEs with EPSS
0.7%
Avg EPSS Score
All Critical High Medium Low
Rank CVE ID EPSS Score Percentile CVSS Flags Summary
8801 CVE-2025-60914
0.04%
11.6th 4.6 This vulnerability allows attackers to bypass access controls in Austrian Archaeological Institute O
8802 CVE-2025-8427
0.04%
11.6th 6.4 This vulnerability allows authenticated WordPress users with Contributor-level access or higher to i
8803 CVE-2025-28994
0.04%
11.8th 4.3 This CVE describes a missing authorization vulnerability in the Viral Loops WP Integration WordPress
8804 CVE-2025-62911
0.04%
11.6th 5.4 This stored cross-site scripting (XSS) vulnerability in the Rock Convert WordPress plugin allows att
8805 CVE-2026-22246
0.04%
11.5th 6.5 This vulnerability in Mastodon allows any registered local user to access lists of severed relations
8806 CVE-2025-62997
0.04%
11.6th 5.3 This vulnerability in WP EasyCart WordPress plugin allows attackers to retrieve embedded sensitive d
8807 CVE-2025-11925
0.04%
11.5th 6.1 This vulnerability allows HTML/JavaScript injection in API responses due to incorrect Content-Type h
8808 CVE-2025-62912
0.04%
11.6th 5.4 This stored cross-site scripting (XSS) vulnerability in SiteGround Email Marketing WordPress plugin
8809 CVE-2025-28996
0.04%
11.8th 4.3 This CVE describes a Missing Authorization vulnerability in the GPP Slideshow WordPress plugin that
8810 CVE-2025-62913
0.04%
11.6th 5.4 This stored cross-site scripting (XSS) vulnerability in the Opal Service WordPress plugin allows att
8811 CVE-2025-6549
0.04%
11.5th 6.5 An incorrect authorization vulnerability in Juniper Junos OS on SRX Series allows unauthenticated at
8812 CVE-2025-14477
0.04%
11.6th 4.9 The 404 Solution WordPress plugin contains a SQL injection vulnerability that allows authenticated a
8813 CVE-2024-55374
0.04%
11.6th 5.3 REDCap 14.3.13 has a username enumeration vulnerability where attackers can distinguish between vali
8814 CVE-2025-62327
0.04%
11.6th 4.9 In HCL DevOps Deploy versions 8.1.2.0 through 8.1.2.3, users with LLM configuration privileges can r
8815 CVE-2025-59136
0.04%
11.6th 5.3 The Efí Bank Gerencianet Oficial WordPress plugin (versions up to 3.1.3) contains a vulnerability w
8816 CVE-2025-63432
0.04%
11.5th 4.6 The Xtooltech Xtool AnyScan Android application fails to validate TLS certificates, allowing attacke
8817 CVE-2025-62917
0.04%
11.6th 5.4 This stored cross-site scripting (XSS) vulnerability in the Tooltipy WordPress plugin allows attacke
8818 CVE-2025-63009
0.04%
11.6th 5.3 This vulnerability in the WP Google Analytics Events WordPress plugin exposes sensitive system infor
8819 CVE-2025-14540
0.04%
11.3th 4.3 The Userback WordPress plugin has an authorization vulnerability that allows authenticated users wit
8820 CVE-2025-29010
0.04%
11.8th 4.3 CVE-2025-29010 is a missing authorization vulnerability in the Behance Portfolio Manager WordPress p
8821 CVE-2025-27368
0.04%
11.4th 4.3 IBM OpenPages 9.0 and 9.1 has insecure REST endpoints that allow authenticated users to access syste
8822 CVE-2025-12890
0.04%
11.4th 6.5 This vulnerability allows attackers to crash Bluetooth Low Energy (BLE) peripherals by sending malfo
8823 CVE-2025-13986
0.04%
11.6th 4.2 This vulnerability allows attackers to bypass authentication in Drupal sites using the Disable Login
8824 CVE-2025-62114
0.04%
11.6th 5.3 This vulnerability in the Download Media Library WordPress plugin exposes sensitive system informati
8825 CVE-2025-12751
0.04%
11.7th 4.3 The WSChat WordPress plugin has an authorization vulnerability that allows authenticated users with
8826 CVE-2025-9099
0.04%
11.5th 6.3 Acrel Environmental Monitoring Cloud Platform up to version 20250804 contains an unrestricted file u
8827 CVE-2025-36112
0.04%
11.5th 5.3 This vulnerability in IBM Sterling B2B Integrator and Sterling File Gateway allows unauthorized user
8828 CVE-2023-6601
0.04%
11.6th 4.7 This vulnerability in FFmpeg's HLS demuxer allows attackers to bypass file extension checks by using
8829 CVE-2025-12156
0.04%
11.7th 4.3 This vulnerability allows authenticated WordPress users with Subscriber-level access or higher to cr
8830 CVE-2025-12022
0.04%
11.7th 4.3 The ELEX WordPress HelpDesk plugin has an authorization vulnerability that allows authenticated user
8831 CVE-2025-30929
0.04%
11.4th 5.3 This CVE describes a Missing Authorization vulnerability in the amazewp fluXtore WordPress plugin th
8832 CVE-2024-56782
0.04%
11.7th 5.5 This CVE describes a NULL pointer dereference vulnerability in the Linux kernel's ACPI subsystem. If
8833 CVE-2025-63035
0.04%
11.5th 6.5 This DOM-based XSS vulnerability in the WPLMS WordPress plugin allows attackers to inject malicious
8834 CVE-2025-13838
0.04%
11.5th 6.4 The WishSuite WordPress plugin has a stored XSS vulnerability in versions up to 1.5.1 that allows au
8835 CVE-2025-12023
0.04%
11.7th 4.3 The ELEX WordPress HelpDesk plugin has an authorization bypass vulnerability that allows authenticat
8836 CVE-2025-47870
0.04%
11.4th 4.3 This vulnerability allows team administrators without member invite privileges to obtain a team's in
8837 CVE-2025-33150
0.04%
11.5th 5.3 IBM Cognos Analytics Certified Containers 12.1.0 contains hidden pages that can expose package param
8838 CVE-2025-12085
0.04%
11.7th 4.3 The ELEX WordPress HelpDesk plugin has an authorization vulnerability that allows authenticated user
8839 CVE-2025-11014
0.04%
11.6th 5.3 A heap-based buffer overflow vulnerability exists in OGRECave Ogre's STBIImageCodec::encode function
8840 CVE-2025-63037
0.04%
11.5th 6.5 This DOM-based Cross-Site Scripting (XSS) vulnerability in the Ronneby Theme Core WordPress plugin a
8841 CVE-2025-12169
0.04%
11.7th 4.3 This vulnerability allows authenticated WordPress users with Subscriber-level access or higher to cl
8842 CVE-2025-63042
0.04%
11.5th 6.5 This stored cross-site scripting (XSS) vulnerability in Tutor LMS Elementor Addons allows attackers
8843 CVE-2025-54767
0.04%
11.5th 6.5 An authenticated read-only user can kill any processes running on the Xormon Original virtual applia
8844 CVE-2024-13647
0.04%
11.3th 4.3 This CSRF vulnerability in the SakolaWP WordPress plugin allows attackers to modify exam settings wi
8845 CVE-2025-63044
0.04%
11.5th 6.5 This vulnerability allows attackers to inject malicious scripts into web pages viewed by other users
8846 CVE-2025-61464
0.04%
11.5th 6.5 This vulnerability allows attackers to perform second-order SQL injection attacks in gnuboard4 throu
8847 CVE-2025-62937
0.04%
11.6th 5.4 This stored cross-site scripting (XSS) vulnerability in the WordPress Post List Featured Image plugi
8848 CVE-2025-12389
0.04%
11.7th 4.3 The Import Export For WooCommerce WordPress plugin has an authorization bypass vulnerability that al
8849 CVE-2026-22518
0.04%
11.5th 6.5 This DOM-based Cross-Site Scripting (XSS) vulnerability in the pencilwp X Addons for Elementor WordP
8850 CVE-2025-13962
0.04%
11.5th 6.4 The Divelogs Widget WordPress plugin has a stored cross-site scripting vulnerability in all versions

What is EPSS?

The Exploit Prediction Scoring System (EPSS) is a data-driven model developed by FIRST.org that estimates the probability a CVE will be exploited in the wild within the next 30 days. Unlike CVSS which measures severity, EPSS measures likelihood of exploitation — making it ideal for prioritizing which vulnerabilities to patch first.

Why EPSS matters: With thousands of CVEs published monthly, not all vulnerabilities are equally dangerous. EPSS helps security teams focus on the CVEs most likely to be actively exploited, rather than patching solely by CVSS score. A critical CVSS 9.8 vulnerability with 0.1% EPSS may be less urgent than a high CVSS 7.5 with 90% EPSS.

Prioritize by Exploit Risk

Scan your servers and see which vulnerabilities have the highest EPSS scores. Focus on what attackers are actually targeting.

Start Monitoring Free