Most Exploitable CVEs - EPSS Rankings
CVEs ranked by EPSS (Exploit Prediction Scoring System) probability. Higher scores mean a greater likelihood of exploitation in the wild within the next 30 days.
| Rank | CVE ID | EPSS Score | Percentile | CVSS | Flags | Summary |
|---|---|---|---|---|---|---|
| 901 | CVE-2024-13345 |
|
83.2th | 7.3 | The Avada Builder WordPress plugin allows unauthenticated attackers to execute arbitrary shortcodes | |
| 902 | CVE-2024-55215 |
|
83.2th | 9.8 | An unauthenticated remote attacker can exploit the /auth/register initialization interface in Trojan | |
| 903 | CVE-2024-13055 |
|
83.1th | 7.1 | The Dyn Business Panel WordPress plugin through version 1.0.0 contains a reflected cross-site script | |
| 904 | CVE-2025-46120 |
|
83.1th | 9.8 | A path traversal vulnerability in Ruckus Unleashed and ZoneDirector web interfaces allows unauthenti | |
| 905 | CVE-2025-21363 |
|
83.1th | 7.8 | This vulnerability allows remote code execution when a user opens a specially crafted Microsoft Word | |
| 906 | CVE-2024-53944 |
|
83.1th | 9.8 | This CVE describes a critical command injection vulnerability in Tuoshi/Dionlink 4G Wi-Fi devices. U | |
| 907 | CVE-2025-11202 |
|
83.1th | 9.8 | This vulnerability allows remote attackers to execute arbitrary code on win-cli-mcp-server installat | |
| 908 | CVE-2025-21220 |
|
83.1th | 7.5 | Microsoft Message Queuing (MSMQ) contains an information disclosure vulnerability that allows authen | |
| 909 | CVE-2025-7160 |
|
83th | 7.3 | This critical SQL injection vulnerability in PHPGurukul Zoo Management System 2.1 allows attackers t | |
| 910 | CVE-2025-25789 |
|
83th | 9.8 | FoxCMS v1.2.5 contains a critical remote code execution vulnerability in the index() method of the S | |
| 911 | CVE-2025-26014 |
|
83th | 9.8 | A critical Remote Code Execution vulnerability in Loggrove v1.0 allows attackers to execute arbitrar | |
| 912 | CVE-2025-14586 |
|
83th | 6.3 | This CVE describes an OS command injection vulnerability in TOTOLINK X5000R routers. Attackers can e | |
| 913 | CVE-2022-50796 |
|
83th | 9.8 | This vulnerability allows unauthenticated attackers to execute arbitrary code on SOUND4 IMPACT/FIRST | |
| 914 | CVE-2025-14276 |
|
83th | 5.6 | This CVE describes a command injection vulnerability in Ilevia EVE X1 Server's leaf_search.php file, | |
| 915 | CVE-2025-9985 |
|
83th | 5.3 | The Featured Image from URL WordPress plugin exposes sensitive information through publicly accessib | |
| 916 | CVE-2025-29971 |
|
82.9th | 7.5 | An out-of-bounds read vulnerability in Microsoft Web Threat Defense (WTD.sys) allows unauthorized at | |
| 917 | CVE-2025-2169 |
|
82.9th | 7.3 | The WPCS WordPress Currency Switcher Professional plugin up to version 1.2.0.4 allows unauthenticate | |
| 918 | CVE-2023-53922 |
|
82.8th | 9.8 | CVE-2023-53922 is a critical remote code execution vulnerability in TinyWebGallery v2.5 that allows | |
| 919 | CVE-2025-4564 |
|
82.8th | 9.8 | The TicketBAI Facturas para WooCommerce WordPress plugin has an arbitrary file deletion vulnerabilit | |
| 920 | CVE-2024-42733 |
|
82.8th | 9.8 | CVE-2024-42733 is a critical remote code execution vulnerability in Docmosis Tornado document genera | |
| 921 | CVE-2024-13495 |
|
82.8th | 7.3 | This vulnerability allows unauthenticated attackers to execute arbitrary WordPress shortcodes throug | |
| 922 | CVE-2025-27956 |
|
82.7th | 7.5 | A directory traversal vulnerability in WebLaudos 24.2 (04) allows remote attackers to access sensiti | |
| 923 | CVE-2024-54916 |
|
82.7th | 6.8 | This vulnerability in Telegram Android allows a physically proximate attacker to bypass the app's pa | |
| 924 | CVE-2025-2244 |
|
82.7th | 9.8 | This vulnerability allows remote attackers to execute arbitrary code on Bitdefender GravityZone Cons | |
| 925 | CVE-2024-44313 |
|
82.7th | 8.1 | CVE-2024-44313 is an incorrect access control vulnerability in TastyIgniter 3.7.6 that allows unauth | |
| 926 | CVE-2025-55747 |
|
82.7th | 9.1 | XWiki Platform versions 6.1-milestone-2 through 16.10.6 expose configuration files via the webjars A | |
| 927 | CVE-2025-24162 |
|
82.6th | 6.5 | This vulnerability is an out-of-bounds read (CWE-125) in Apple's WebKit browser engine that could ca | |
| 928 | CVE-2024-55504 |
|
82.6th | 5.5 | This vulnerability allows local attackers to execute arbitrary code via a malicious dynamic library | |
| 929 | CVE-2026-0507 |
|
82.6th | 8.4 | This CVE describes an OS command injection vulnerability in SAP Application Server for ABAP and SAP | |
| 930 | CVE-2025-21356 |
|
82.6th | 7.8 | This vulnerability allows remote code execution when a user opens a specially crafted Visio file. At | |
| 931 | CVE-2013-10073 |
|
82.6th | 8.8 | This vulnerability allows authenticated users with access to the Auto-Discovery tool in Nagios XI to | |
| 932 | CVE-2022-32221 |
|
82.5th | 9.8 | This vulnerability in libcurl allows an attacker to cause memory corruption or data leakage when reu | |
| 933 | CVE-2025-24797 |
|
82.5th | 9.4 | CVE-2025-24797 is a critical buffer overflow vulnerability in Meshtastic firmware that allows unauth | |
| 934 | CVE-2025-21294 |
|
82.5th | 8.1 | This vulnerability allows remote code execution via Microsoft Digest Authentication, enabling attack | |
| 935 | CVE-2024-13453 |
|
82.5th | 7.3 | This vulnerability allows unauthenticated attackers to execute arbitrary WordPress shortcodes throug | |
| 936 | CVE-2024-48818 |
|
82.5th | 9.8 | This critical vulnerability in IIT Bombay's Bodhitree cs101 platform allows remote attackers to exec | |
| 937 | CVE-2024-12737 |
|
82.5th | 6.1 | This vulnerability allows attackers to inject malicious scripts via unsanitized parameters in the WP | |
| 938 | CVE-2025-2004 |
|
82.5th | 9.1 | The Simple WP Events WordPress plugin allows unauthenticated attackers to delete arbitrary files on | |
| 939 | CVE-2025-26355 |
|
82.5th | 6.5 | This path traversal vulnerability in Q-Free MaxTime allows authenticated remote attackers to delete | |
| 940 | CVE-2025-26352 |
|
82.5th | 6.5 | This path traversal vulnerability in Q-Free MaxTime allows authenticated remote attackers to delete | |
| 941 | CVE-2025-1497 |
|
82.4th | 9.8 | CVE-2025-1497 is a critical remote code execution vulnerability in PlotAI where insufficient validat | |
| 942 | CVE-2024-57214 |
|
82.4th | 6.3 | This CVE describes a command injection vulnerability in TOTOLINK A6000R routers where an attacker ca | |
| 943 | CVE-2025-6851 |
|
82.4th | 7.2 | The Broken Link Notifier WordPress plugin contains a Server-Side Request Forgery (SSRF) vulnerabilit | |
| 944 | CVE-2025-24237 |
|
82.4th | 9.8 | A buffer overflow vulnerability in Apple operating systems allows malicious apps to cause system cra | |
| 945 | CVE-2025-1913 |
|
82.4th | 7.2 | This vulnerability allows authenticated WordPress administrators to inject PHP objects via deseriali | |
| 946 | CVE-2025-54261 |
|
82.4th | 10.0 | This critical path traversal vulnerability in Adobe ColdFusion allows attackers to escape restricted | |
| 947 | CVE-2025-22926 |
|
82.4th | 9.8 | This vulnerability allows attackers to perform directory traversal attacks by sending a specially cr | |
| 948 | CVE-2024-53868 |
|
82.3th | 7.5 | Apache Traffic Server is vulnerable to HTTP request smuggling when processing malformed chunked mess | |
| 949 | CVE-2025-21244 |
|
82.3th | 8.8 | This is a remote code execution vulnerability in the Windows Telephony Service that allows attackers | |
| 950 | CVE-2025-21243 |
|
82.3th | 8.8 | This vulnerability in Windows Telephony Service allows remote attackers to execute arbitrary code on |
What is EPSS?
The Exploit Prediction Scoring System (EPSS) is a data-driven model developed by FIRST.org that estimates the probability a CVE will be exploited in the wild within the next 30 days. Unlike CVSS which measures severity, EPSS measures likelihood of exploitation — making it ideal for prioritizing which vulnerabilities to patch first.
Why EPSS matters: With thousands of CVEs published monthly, not all vulnerabilities are equally dangerous. EPSS helps security teams focus on the CVEs most likely to be actively exploited, rather than patching solely by CVSS score. A critical CVSS 9.8 vulnerability with 0.1% EPSS may be less urgent than a high CVSS 7.5 with 90% EPSS.
Prioritize by Exploit Risk
Scan your servers and see which vulnerabilities have the highest EPSS scores. Focus on what attackers are actually targeting.
Start Monitoring Free