Most Exploitable CVEs - EPSS Rankings
CVEs ranked by EPSS (Exploit Prediction Scoring System) probability. Higher scores mean a greater likelihood of exploitation in the wild within the next 30 days.
| Rank | CVE ID | EPSS Score | Percentile | CVSS | Flags | Summary |
|---|---|---|---|---|---|---|
| 8801 | CVE-2025-60914 |
|
11.6th | 4.6 | This vulnerability allows attackers to bypass access controls in Austrian Archaeological Institute O | |
| 8802 | CVE-2025-8427 |
|
11.6th | 6.4 | This vulnerability allows authenticated WordPress users with Contributor-level access or higher to i | |
| 8803 | CVE-2025-28994 |
|
11.8th | 4.3 | This CVE describes a missing authorization vulnerability in the Viral Loops WP Integration WordPress | |
| 8804 | CVE-2025-62911 |
|
11.6th | 5.4 | This stored cross-site scripting (XSS) vulnerability in the Rock Convert WordPress plugin allows att | |
| 8805 | CVE-2026-22246 |
|
11.5th | 6.5 | This vulnerability in Mastodon allows any registered local user to access lists of severed relations | |
| 8806 | CVE-2025-62997 |
|
11.6th | 5.3 | This vulnerability in WP EasyCart WordPress plugin allows attackers to retrieve embedded sensitive d | |
| 8807 | CVE-2025-11925 |
|
11.5th | 6.1 | This vulnerability allows HTML/JavaScript injection in API responses due to incorrect Content-Type h | |
| 8808 | CVE-2025-62912 |
|
11.6th | 5.4 | This stored cross-site scripting (XSS) vulnerability in SiteGround Email Marketing WordPress plugin | |
| 8809 | CVE-2025-28996 |
|
11.8th | 4.3 | This CVE describes a Missing Authorization vulnerability in the GPP Slideshow WordPress plugin that | |
| 8810 | CVE-2025-62913 |
|
11.6th | 5.4 | This stored cross-site scripting (XSS) vulnerability in the Opal Service WordPress plugin allows att | |
| 8811 | CVE-2025-6549 |
|
11.5th | 6.5 | An incorrect authorization vulnerability in Juniper Junos OS on SRX Series allows unauthenticated at | |
| 8812 | CVE-2025-14477 |
|
11.6th | 4.9 | The 404 Solution WordPress plugin contains a SQL injection vulnerability that allows authenticated a | |
| 8813 | CVE-2024-55374 |
|
11.6th | 5.3 | REDCap 14.3.13 has a username enumeration vulnerability where attackers can distinguish between vali | |
| 8814 | CVE-2025-62327 |
|
11.6th | 4.9 | In HCL DevOps Deploy versions 8.1.2.0 through 8.1.2.3, users with LLM configuration privileges can r | |
| 8815 | CVE-2025-59136 |
|
11.6th | 5.3 | The Efí Bank Gerencianet Oficial WordPress plugin (versions up to 3.1.3) contains a vulnerability w | |
| 8816 | CVE-2025-63432 |
|
11.5th | 4.6 | The Xtooltech Xtool AnyScan Android application fails to validate TLS certificates, allowing attacke | |
| 8817 | CVE-2025-62917 |
|
11.6th | 5.4 | This stored cross-site scripting (XSS) vulnerability in the Tooltipy WordPress plugin allows attacke | |
| 8818 | CVE-2025-63009 |
|
11.6th | 5.3 | This vulnerability in the WP Google Analytics Events WordPress plugin exposes sensitive system infor | |
| 8819 | CVE-2025-14540 |
|
11.3th | 4.3 | The Userback WordPress plugin has an authorization vulnerability that allows authenticated users wit | |
| 8820 | CVE-2025-29010 |
|
11.8th | 4.3 | CVE-2025-29010 is a missing authorization vulnerability in the Behance Portfolio Manager WordPress p | |
| 8821 | CVE-2025-27368 |
|
11.4th | 4.3 | IBM OpenPages 9.0 and 9.1 has insecure REST endpoints that allow authenticated users to access syste | |
| 8822 | CVE-2025-12890 |
|
11.4th | 6.5 | This vulnerability allows attackers to crash Bluetooth Low Energy (BLE) peripherals by sending malfo | |
| 8823 | CVE-2025-13986 |
|
11.6th | 4.2 | This vulnerability allows attackers to bypass authentication in Drupal sites using the Disable Login | |
| 8824 | CVE-2025-62114 |
|
11.6th | 5.3 | This vulnerability in the Download Media Library WordPress plugin exposes sensitive system informati | |
| 8825 | CVE-2025-12751 |
|
11.7th | 4.3 | The WSChat WordPress plugin has an authorization vulnerability that allows authenticated users with | |
| 8826 | CVE-2025-9099 |
|
11.5th | 6.3 | Acrel Environmental Monitoring Cloud Platform up to version 20250804 contains an unrestricted file u | |
| 8827 | CVE-2025-36112 |
|
11.5th | 5.3 | This vulnerability in IBM Sterling B2B Integrator and Sterling File Gateway allows unauthorized user | |
| 8828 | CVE-2023-6601 |
|
11.6th | 4.7 | This vulnerability in FFmpeg's HLS demuxer allows attackers to bypass file extension checks by using | |
| 8829 | CVE-2025-12156 |
|
11.7th | 4.3 | This vulnerability allows authenticated WordPress users with Subscriber-level access or higher to cr | |
| 8830 | CVE-2025-12022 |
|
11.7th | 4.3 | The ELEX WordPress HelpDesk plugin has an authorization vulnerability that allows authenticated user | |
| 8831 | CVE-2025-30929 |
|
11.4th | 5.3 | This CVE describes a Missing Authorization vulnerability in the amazewp fluXtore WordPress plugin th | |
| 8832 | CVE-2024-56782 |
|
11.7th | 5.5 | This CVE describes a NULL pointer dereference vulnerability in the Linux kernel's ACPI subsystem. If | |
| 8833 | CVE-2025-63035 |
|
11.5th | 6.5 | This DOM-based XSS vulnerability in the WPLMS WordPress plugin allows attackers to inject malicious | |
| 8834 | CVE-2025-13838 |
|
11.5th | 6.4 | The WishSuite WordPress plugin has a stored XSS vulnerability in versions up to 1.5.1 that allows au | |
| 8835 | CVE-2025-12023 |
|
11.7th | 4.3 | The ELEX WordPress HelpDesk plugin has an authorization bypass vulnerability that allows authenticat | |
| 8836 | CVE-2025-47870 |
|
11.4th | 4.3 | This vulnerability allows team administrators without member invite privileges to obtain a team's in | |
| 8837 | CVE-2025-33150 |
|
11.5th | 5.3 | IBM Cognos Analytics Certified Containers 12.1.0 contains hidden pages that can expose package param | |
| 8838 | CVE-2025-12085 |
|
11.7th | 4.3 | The ELEX WordPress HelpDesk plugin has an authorization vulnerability that allows authenticated user | |
| 8839 | CVE-2025-11014 |
|
11.6th | 5.3 | A heap-based buffer overflow vulnerability exists in OGRECave Ogre's STBIImageCodec::encode function | |
| 8840 | CVE-2025-63037 |
|
11.5th | 6.5 | This DOM-based Cross-Site Scripting (XSS) vulnerability in the Ronneby Theme Core WordPress plugin a | |
| 8841 | CVE-2025-12169 |
|
11.7th | 4.3 | This vulnerability allows authenticated WordPress users with Subscriber-level access or higher to cl | |
| 8842 | CVE-2025-63042 |
|
11.5th | 6.5 | This stored cross-site scripting (XSS) vulnerability in Tutor LMS Elementor Addons allows attackers | |
| 8843 | CVE-2025-54767 |
|
11.5th | 6.5 | An authenticated read-only user can kill any processes running on the Xormon Original virtual applia | |
| 8844 | CVE-2024-13647 |
|
11.3th | 4.3 | This CSRF vulnerability in the SakolaWP WordPress plugin allows attackers to modify exam settings wi | |
| 8845 | CVE-2025-63044 |
|
11.5th | 6.5 | This vulnerability allows attackers to inject malicious scripts into web pages viewed by other users | |
| 8846 | CVE-2025-61464 |
|
11.5th | 6.5 | This vulnerability allows attackers to perform second-order SQL injection attacks in gnuboard4 throu | |
| 8847 | CVE-2025-62937 |
|
11.6th | 5.4 | This stored cross-site scripting (XSS) vulnerability in the WordPress Post List Featured Image plugi | |
| 8848 | CVE-2025-12389 |
|
11.7th | 4.3 | The Import Export For WooCommerce WordPress plugin has an authorization bypass vulnerability that al | |
| 8849 | CVE-2026-22518 |
|
11.5th | 6.5 | This DOM-based Cross-Site Scripting (XSS) vulnerability in the pencilwp X Addons for Elementor WordP | |
| 8850 | CVE-2025-13962 |
|
11.5th | 6.4 | The Divelogs Widget WordPress plugin has a stored cross-site scripting vulnerability in all versions |
What is EPSS?
The Exploit Prediction Scoring System (EPSS) is a data-driven model developed by FIRST.org that estimates the probability a CVE will be exploited in the wild within the next 30 days. Unlike CVSS which measures severity, EPSS measures likelihood of exploitation — making it ideal for prioritizing which vulnerabilities to patch first.
Why EPSS matters: With thousands of CVEs published monthly, not all vulnerabilities are equally dangerous. EPSS helps security teams focus on the CVEs most likely to be actively exploited, rather than patching solely by CVSS score. A critical CVSS 9.8 vulnerability with 0.1% EPSS may be less urgent than a high CVSS 7.5 with 90% EPSS.
Prioritize by Exploit Risk
Scan your servers and see which vulnerabilities have the highest EPSS scores. Focus on what attackers are actually targeting.
Start Monitoring Free