Most Exploitable CVEs - EPSS Rankings

CVEs ranked by EPSS (Exploit Prediction Scoring System) probability. Higher scores mean a greater likelihood of exploitation in the wild within the next 30 days.

164
EPSS > 50%
156
CISA KEV Listed
35,468
CVEs with EPSS
0.7%
Avg EPSS Score
All Critical High Medium Low
Rank CVE ID EPSS Score Percentile CVSS Flags Summary
9051 CVE-2025-25469
0.12%
30.8th 6.5 A memory leak vulnerability exists in FFmpeg's IAMF (Immersive Audio Model and Format) component tha
9052 CVE-2024-12651
0.12%
30.8th 8.5 This vulnerability in PTT Inc. HGS Mobile App allows attackers to manipulate user-controlled variabl
9053 CVE-2025-0525
0.12%
30.8th 7.5 This vulnerability in Octopus Server allows attackers to use the preview import feature to determine
9054 CVE-2024-57606
0.12%
30.8th 7.5 This SQL injection vulnerability in JeecgBoot v3.7.2 allows remote attackers to execute arbitrary SQ
9055 CVE-2025-24372
0.12%
30.9th 7.3 CVE-2025-24372 is a cross-site scripting (XSS) vulnerability in CKAN data management systems that al
9056 CVE-2025-2862
0.12%
30.9th 7.5 SaTECH BCU firmware version 2.1.3 uses weak password encryption, allowing attackers with system or w
9057 CVE-2025-0188
0.12%
30.9th 6.5 A Server-Side Request Forgery (SSRF) vulnerability in gaizhenbiao/chuanhuchatgpt allows attackers to
9058 CVE-2024-9900
0.12%
30.8th 6.1 This Cross-Site Scripting (XSS) vulnerability in mudler/localai v2.21.1 allows attackers to inject m
9059 CVE-2024-7771
0.12%
30.8th 6.5 A denial-of-service vulnerability in Dockerized anything-llm allows attackers to crash the entire si
9060 CVE-2024-10955
0.12%
30.8th 6.5 This CVE describes a Regular Expression Denial of Service (ReDoS) vulnerability in gaizhenbiao/chuan
9061 CVE-2025-26485
0.12%
30.8th 5.8 This vulnerability in Beta80 Life 1st allows attackers to distinguish between invalid passwords and
9062 CVE-2025-25497
0.12%
30.8th 8.1 CVE-2025-25497 is a client-side validation bypass vulnerability in Netsweeper Server that allows att
9063 CVE-2024-57174
0.12%
30.8th 8.1 A DNS suffix misconfiguration in Alphion ASEE-1443 routers allows attackers to register an unclaimed
9064 CVE-2025-3804
0.12%
30.9th 5.3 This critical vulnerability in thautwarm's vscode-diana extension allows injection attacks through t
9065 CVE-2025-2073
0.12%
30.8th 8.8 This vulnerability allows a local attacker with low privileges to trigger an out-of-bounds read in t
9066 CVE-2024-12224
0.12%
30.9th 8.8 This vulnerability in the idna crate from Servo rust-url allows attackers to create punycode hostnam
9067 CVE-2025-52815
0.12%
30.9th 8.1 This vulnerability allows attackers to include local PHP files through improper filename control in
9068 CVE-2025-52812
0.12%
30.9th 8.1 This vulnerability allows attackers to include local files on the server through improper filename c
9069 CVE-2025-52729
0.12%
30.9th 8.1 This CVE describes a PHP Local File Inclusion vulnerability in the Diza WordPress theme. Attackers c
9070 CVE-2025-52723
0.12%
30.9th 8.1 This CVE describes a PHP Local File Inclusion vulnerability in the Networker WordPress theme that al
9071 CVE-2025-49883
0.12%
30.9th 8.1 This vulnerability allows attackers to include local files on the server through improper filename c
9072 CVE-2025-30992
0.12%
30.9th 8.1 This CVE describes a Local File Inclusion vulnerability in the Puca WordPress theme that allows atta
9073 CVE-2025-28998
0.12%
30.9th 8.1 This vulnerability allows attackers to include local files on the server through improper filename c
9074 CVE-2025-28990
0.12%
30.9th 8.1 This vulnerability allows attackers to include local files on the server through improper filename c
9075 CVE-2025-28947
0.12%
30.9th 8.1 This vulnerability allows attackers to include local files on the server through improper filename c
9076 CVE-2025-24769
0.12%
30.9th 8.1 This vulnerability allows attackers to include local files on the server through improper filename c
9077 CVE-2025-24760
0.12%
30.9th 8.1 This vulnerability allows attackers to include local files on the server through improper filename c
9078 CVE-2025-49261
0.12%
30.9th 8.1 This vulnerability allows attackers to include local files on the server through improper filename c
9079 CVE-2025-49259
0.12%
30.9th 8.1 This CVE describes a Local File Inclusion vulnerability in the Hara WordPress theme that allows atta
9080 CVE-2025-49257
0.12%
30.9th 8.1 This vulnerability allows attackers to include local files on the server through improper filename c
9081 CVE-2025-49255
0.12%
30.9th 8.1 This vulnerability allows attackers to include local files on the server through improper filename c
9082 CVE-2025-49253
0.12%
30.9th 8.1 This CVE describes a PHP Local File Inclusion vulnerability in the Lasa WordPress theme. Attackers c
9083 CVE-2025-49251
0.12%
30.9th 8.1 This vulnerability allows attackers to include local files on the server through improper filename c
9084 CVE-2025-28991
0.12%
30.9th 8.1 This vulnerability allows attackers to include local files on the server through improper filename c
9085 CVE-2025-24761
0.12%
30.9th 8.1 This vulnerability allows attackers to include local files on the server through improper filename c
9086 CVE-2025-3602
0.12%
30.9th 7.5 This vulnerability allows remote attackers to perform denial-of-service attacks on Liferay Portal/DX
9087 CVE-2025-39476
0.12%
30.9th 7.5 This vulnerability allows attackers to include local files on the server through improper filename c
9088 CVE-2025-5528
0.12%
30.9th 6.1 This vulnerability allows unauthenticated attackers to inject malicious scripts via the heateor_mast
9089 CVE-2025-29872
0.12%
30.9th 7.5 This vulnerability in QNAP File Station 5 allows authenticated attackers to exhaust system resources
9090 CVE-2025-31422
0.12%
30.9th 8.8 This vulnerability allows attackers to inject malicious objects through deserialization of untrusted
9091 CVE-2025-24777
0.12%
30.9th 8.8 This CVE describes a PHP object injection vulnerability in the Hillter WordPress theme due to unsafe
9092 CVE-2025-7667
0.12%
30.9th 8.1 This CSRF vulnerability in the WordPress Restrict File Access plugin allows unauthenticated attacker
9093 CVE-2024-25178
0.12%
30.8th 9.1 This vulnerability is an out-of-bounds read in the stack-overflow handler of LuaJIT, which could all
9094 CVE-2024-25176
0.12%
30.8th 9.8 This CVE describes a stack buffer overflow vulnerability in LuaJIT's string formatting function (lj_
9095 CVE-2025-41672
0.12%
30.9th 10.0 This critical vulnerability allows remote unauthenticated attackers to generate valid JWT tokens usi
9096 CVE-2025-4414
0.12%
30.9th 8.1 This vulnerability allows attackers to include local PHP files through improper filename control in
9097 CVE-2025-6814
0.12%
30.9th 7.5 The Booking X WordPress plugin versions 1.0 to 1.1.2 contain an authorization bypass vulnerability i
9098 CVE-2025-54007
0.12%
30.9th 8.8 A PHP object injection vulnerability in PickPlugins Post Grid and Gutenberg Blocks WordPress plugins
9099 CVE-2025-49869
0.12%
30.9th 8.8 This CVE describes a PHP object injection vulnerability in the Eventin WordPress plugin caused by un
9100 CVE-2025-51052
0.12%
30.8th 6.5 A path traversal vulnerability in Vedo Suite 2024.17 allows authenticated attackers to read arbitrar

What is EPSS?

The Exploit Prediction Scoring System (EPSS) is a data-driven model developed by FIRST.org that estimates the probability a CVE will be exploited in the wild within the next 30 days. Unlike CVSS which measures severity, EPSS measures likelihood of exploitation — making it ideal for prioritizing which vulnerabilities to patch first.

Why EPSS matters: With thousands of CVEs published monthly, not all vulnerabilities are equally dangerous. EPSS helps security teams focus on the CVEs most likely to be actively exploited, rather than patching solely by CVSS score. A critical CVSS 9.8 vulnerability with 0.1% EPSS may be less urgent than a high CVSS 7.5 with 90% EPSS.

Prioritize by Exploit Risk

Scan your servers and see which vulnerabilities have the highest EPSS scores. Focus on what attackers are actually targeting.

Start Monitoring Free