Most Exploitable CVEs - EPSS Rankings
CVEs ranked by EPSS (Exploit Prediction Scoring System) probability. Higher scores mean a greater likelihood of exploitation in the wild within the next 30 days.
| Rank | CVE ID | EPSS Score | Percentile | CVSS | Flags | Summary |
|---|---|---|---|---|---|---|
| 9051 | CVE-2025-25469 |
|
30.8th | 6.5 | A memory leak vulnerability exists in FFmpeg's IAMF (Immersive Audio Model and Format) component tha | |
| 9052 | CVE-2024-12651 |
|
30.8th | 8.5 | This vulnerability in PTT Inc. HGS Mobile App allows attackers to manipulate user-controlled variabl | |
| 9053 | CVE-2025-0525 |
|
30.8th | 7.5 | This vulnerability in Octopus Server allows attackers to use the preview import feature to determine | |
| 9054 | CVE-2024-57606 |
|
30.8th | 7.5 | This SQL injection vulnerability in JeecgBoot v3.7.2 allows remote attackers to execute arbitrary SQ | |
| 9055 | CVE-2025-24372 |
|
30.9th | 7.3 | CVE-2025-24372 is a cross-site scripting (XSS) vulnerability in CKAN data management systems that al | |
| 9056 | CVE-2025-2862 |
|
30.9th | 7.5 | SaTECH BCU firmware version 2.1.3 uses weak password encryption, allowing attackers with system or w | |
| 9057 | CVE-2025-0188 |
|
30.9th | 6.5 | A Server-Side Request Forgery (SSRF) vulnerability in gaizhenbiao/chuanhuchatgpt allows attackers to | |
| 9058 | CVE-2024-9900 |
|
30.8th | 6.1 | This Cross-Site Scripting (XSS) vulnerability in mudler/localai v2.21.1 allows attackers to inject m | |
| 9059 | CVE-2024-7771 |
|
30.8th | 6.5 | A denial-of-service vulnerability in Dockerized anything-llm allows attackers to crash the entire si | |
| 9060 | CVE-2024-10955 |
|
30.8th | 6.5 | This CVE describes a Regular Expression Denial of Service (ReDoS) vulnerability in gaizhenbiao/chuan | |
| 9061 | CVE-2025-26485 |
|
30.8th | 5.8 | This vulnerability in Beta80 Life 1st allows attackers to distinguish between invalid passwords and | |
| 9062 | CVE-2025-25497 |
|
30.8th | 8.1 | CVE-2025-25497 is a client-side validation bypass vulnerability in Netsweeper Server that allows att | |
| 9063 | CVE-2024-57174 |
|
30.8th | 8.1 | A DNS suffix misconfiguration in Alphion ASEE-1443 routers allows attackers to register an unclaimed | |
| 9064 | CVE-2025-3804 |
|
30.9th | 5.3 | This critical vulnerability in thautwarm's vscode-diana extension allows injection attacks through t | |
| 9065 | CVE-2025-2073 |
|
30.8th | 8.8 | This vulnerability allows a local attacker with low privileges to trigger an out-of-bounds read in t | |
| 9066 | CVE-2024-12224 |
|
30.9th | 8.8 | This vulnerability in the idna crate from Servo rust-url allows attackers to create punycode hostnam | |
| 9067 | CVE-2025-52815 |
|
30.9th | 8.1 | This vulnerability allows attackers to include local PHP files through improper filename control in | |
| 9068 | CVE-2025-52812 |
|
30.9th | 8.1 | This vulnerability allows attackers to include local files on the server through improper filename c | |
| 9069 | CVE-2025-52729 |
|
30.9th | 8.1 | This CVE describes a PHP Local File Inclusion vulnerability in the Diza WordPress theme. Attackers c | |
| 9070 | CVE-2025-52723 |
|
30.9th | 8.1 | This CVE describes a PHP Local File Inclusion vulnerability in the Networker WordPress theme that al | |
| 9071 | CVE-2025-49883 |
|
30.9th | 8.1 | This vulnerability allows attackers to include local files on the server through improper filename c | |
| 9072 | CVE-2025-30992 |
|
30.9th | 8.1 | This CVE describes a Local File Inclusion vulnerability in the Puca WordPress theme that allows atta | |
| 9073 | CVE-2025-28998 |
|
30.9th | 8.1 | This vulnerability allows attackers to include local files on the server through improper filename c | |
| 9074 | CVE-2025-28990 |
|
30.9th | 8.1 | This vulnerability allows attackers to include local files on the server through improper filename c | |
| 9075 | CVE-2025-28947 |
|
30.9th | 8.1 | This vulnerability allows attackers to include local files on the server through improper filename c | |
| 9076 | CVE-2025-24769 |
|
30.9th | 8.1 | This vulnerability allows attackers to include local files on the server through improper filename c | |
| 9077 | CVE-2025-24760 |
|
30.9th | 8.1 | This vulnerability allows attackers to include local files on the server through improper filename c | |
| 9078 | CVE-2025-49261 |
|
30.9th | 8.1 | This vulnerability allows attackers to include local files on the server through improper filename c | |
| 9079 | CVE-2025-49259 |
|
30.9th | 8.1 | This CVE describes a Local File Inclusion vulnerability in the Hara WordPress theme that allows atta | |
| 9080 | CVE-2025-49257 |
|
30.9th | 8.1 | This vulnerability allows attackers to include local files on the server through improper filename c | |
| 9081 | CVE-2025-49255 |
|
30.9th | 8.1 | This vulnerability allows attackers to include local files on the server through improper filename c | |
| 9082 | CVE-2025-49253 |
|
30.9th | 8.1 | This CVE describes a PHP Local File Inclusion vulnerability in the Lasa WordPress theme. Attackers c | |
| 9083 | CVE-2025-49251 |
|
30.9th | 8.1 | This vulnerability allows attackers to include local files on the server through improper filename c | |
| 9084 | CVE-2025-28991 |
|
30.9th | 8.1 | This vulnerability allows attackers to include local files on the server through improper filename c | |
| 9085 | CVE-2025-24761 |
|
30.9th | 8.1 | This vulnerability allows attackers to include local files on the server through improper filename c | |
| 9086 | CVE-2025-3602 |
|
30.9th | 7.5 | This vulnerability allows remote attackers to perform denial-of-service attacks on Liferay Portal/DX | |
| 9087 | CVE-2025-39476 |
|
30.9th | 7.5 | This vulnerability allows attackers to include local files on the server through improper filename c | |
| 9088 | CVE-2025-5528 |
|
30.9th | 6.1 | This vulnerability allows unauthenticated attackers to inject malicious scripts via the heateor_mast | |
| 9089 | CVE-2025-29872 |
|
30.9th | 7.5 | This vulnerability in QNAP File Station 5 allows authenticated attackers to exhaust system resources | |
| 9090 | CVE-2025-31422 |
|
30.9th | 8.8 | This vulnerability allows attackers to inject malicious objects through deserialization of untrusted | |
| 9091 | CVE-2025-24777 |
|
30.9th | 8.8 | This CVE describes a PHP object injection vulnerability in the Hillter WordPress theme due to unsafe | |
| 9092 | CVE-2025-7667 |
|
30.9th | 8.1 | This CSRF vulnerability in the WordPress Restrict File Access plugin allows unauthenticated attacker | |
| 9093 | CVE-2024-25178 |
|
30.8th | 9.1 | This vulnerability is an out-of-bounds read in the stack-overflow handler of LuaJIT, which could all | |
| 9094 | CVE-2024-25176 |
|
30.8th | 9.8 | This CVE describes a stack buffer overflow vulnerability in LuaJIT's string formatting function (lj_ | |
| 9095 | CVE-2025-41672 |
|
30.9th | 10.0 | This critical vulnerability allows remote unauthenticated attackers to generate valid JWT tokens usi | |
| 9096 | CVE-2025-4414 |
|
30.9th | 8.1 | This vulnerability allows attackers to include local PHP files through improper filename control in | |
| 9097 | CVE-2025-6814 |
|
30.9th | 7.5 | The Booking X WordPress plugin versions 1.0 to 1.1.2 contain an authorization bypass vulnerability i | |
| 9098 | CVE-2025-54007 |
|
30.9th | 8.8 | A PHP object injection vulnerability in PickPlugins Post Grid and Gutenberg Blocks WordPress plugins | |
| 9099 | CVE-2025-49869 |
|
30.9th | 8.8 | This CVE describes a PHP object injection vulnerability in the Eventin WordPress plugin caused by un | |
| 9100 | CVE-2025-51052 |
|
30.8th | 6.5 | A path traversal vulnerability in Vedo Suite 2024.17 allows authenticated attackers to read arbitrar |
What is EPSS?
The Exploit Prediction Scoring System (EPSS) is a data-driven model developed by FIRST.org that estimates the probability a CVE will be exploited in the wild within the next 30 days. Unlike CVSS which measures severity, EPSS measures likelihood of exploitation — making it ideal for prioritizing which vulnerabilities to patch first.
Why EPSS matters: With thousands of CVEs published monthly, not all vulnerabilities are equally dangerous. EPSS helps security teams focus on the CVEs most likely to be actively exploited, rather than patching solely by CVSS score. A critical CVSS 9.8 vulnerability with 0.1% EPSS may be less urgent than a high CVSS 7.5 with 90% EPSS.
Prioritize by Exploit Risk
Scan your servers and see which vulnerabilities have the highest EPSS scores. Focus on what attackers are actually targeting.
Start Monitoring Free