Most Exploitable CVEs - EPSS Rankings

CVEs ranked by EPSS (Exploit Prediction Scoring System) probability. Higher scores mean a greater likelihood of exploitation in the wild within the next 30 days.

164
EPSS > 50%
156
CISA KEV Listed
35,468
CVEs with EPSS
0.7%
Avg EPSS Score
All Critical High Medium Low
Rank CVE ID EPSS Score Percentile CVSS Flags Summary
51 CVE-2025-26319
78.8%
99th 9.8 FlowiseAI Flowise v2.2.6 contains an arbitrary file upload vulnerability in the /api/v1/attachments
52 CVE-2024-11613
78.73%
99th 9.8 This vulnerability in the WordPress File Upload plugin allows unauthenticated attackers to execute a
53 CVE-2025-30004
78.59%
99th 8.8 Xorcom CompletePBX versions up to 5.2.35 contain an authenticated command injection vulnerability in
54 CVE-2025-13486
78.45%
99th 9.8 This vulnerability allows unauthenticated attackers to execute arbitrary code on WordPress sites run
55 CVE-2025-2945
77.9%
99th 9.9 This CVE describes a critical remote code execution vulnerability in pgAdmin 4 where attacker-contro
56 CVE-2024-55457
77.89%
99th 6.5 MasterSAM Star Gate 11 has a directory traversal vulnerability in the /adama/adama/downloadService e
57 CVE-2025-27520
77.82%
99th 9.8 CVE-2025-27520 is a critical remote code execution vulnerability in BentoML caused by insecure deser
58 CVE-2025-0994
77.8%
99th 8.8 KEV This vulnerability allows authenticated users to execute arbitrary code on Trimble Cityworks servers
59 CVE-2025-40551
77.66%
99th 9.8 KEV SolarWinds Web Help Desk has an unauthenticated remote code execution vulnerability via untrusted da
60 CVE-2025-5777
77.56%
99th 7.5 KEV CVE-2025-5777 (CitrixBleed 2) is a memory disclosure vulnerability in Citrix NetScaler ADC and Gatew
61 CVE-2024-46310
77.52%
99th 9.1 This vulnerability allows unauthenticated attackers to read and modify arbitrary user data in Cfx.re
62 CVE-2025-32432
77.38%
98.9th 10.0 CVE-2025-32432 is a critical remote code execution vulnerability in Craft CMS that allows attackers
63 CVE-2025-1232
77.24%
98.9th 8.8 This vulnerability in the Site Reviews WordPress plugin allows unauthenticated attackers to inject m
64 CVE-2025-21298
76.87%
98.9th 9.8 This critical vulnerability in Windows OLE (Object Linking and Embedding) allows remote attackers to
65 CVE-2025-27363
76.68%
98.9th 8.1 KEV This CVE describes an out-of-bounds write vulnerability in FreeType versions 2.13.0 and below when p
66 CVE-2024-48456
76.36%
98.9th 7.5 This vulnerability allows a remote attacker to obtain sensitive information, specifically the admin
67 CVE-2012-10054
75.94%
98.9th 9.8 This vulnerability allows unauthenticated attackers to upload and execute arbitrary ASPX scripts on
68 CVE-2013-10051
75.81%
98.9th 9.8 This CVE describes a critical remote code execution vulnerability in InstantCMS versions 1.6 and ear
69 CVE-2024-57045
74.5%
98.8th 9.8 This critical vulnerability in D-Link DIR-859 routers allows attackers to bypass authentication by f
70 CVE-2025-59287
74.26%
98.8th 9.8 KEV CVE-2025-59287 is a critical deserialization vulnerability in Windows Server Update Service (WSUS) t
71 CVE-2025-57819
74.22%
98.8th 9.8 KEV CVE-2025-57819 is a critical vulnerability in FreePBX that allows unauthenticated attackers to bypas
72 CVE-2025-27007
73.91%
98.8th 9.8 This vulnerability allows attackers to escalate privileges in Brainstorm Force SureTriggers WordPres
73 CVE-2025-48827
73.85%
98.8th 10.0 This vulnerability allows unauthenticated attackers to invoke protected API controller methods in vB
74 CVE-2024-12971
73.65%
98.8th 8.8 This CVE allows attackers to execute arbitrary operating system commands on Pandora FMS servers by i
75 CVE-2013-10061
73.14%
98.8th 7.2 This CVE describes an authenticated OS command injection vulnerability in Netgear DGN1000B routers t
76 CVE-2025-21333
72.93%
98.7th 7.8 KEV This vulnerability allows a local authenticated attacker to escalate privileges on Windows Hyper-V h
77 CVE-2024-6842
72.56%
98.7th 7.5 This vulnerability allows unauthenticated attackers to access the /setup-complete API endpoint in An
78 CVE-2020-36849
72.22%
98.7th 9.8 The AIT CSV import/export WordPress plugin allows unauthenticated attackers to upload arbitrary file
79 CVE-2025-26794
72.09%
98.7th 7.5 Exim mail servers running versions 4.98 before 4.98.1 with SQLite hints and ETRN serialization enabl
80 CVE-2025-13316
72.01%
98.7th 8.1 CVE-2025-13316 is a cryptographic vulnerability in Twonky Server 8.5.2 where hard-coded encryption k
81 CVE-2025-34111
70.89%
98.7th 9.8 This vulnerability allows unauthenticated remote attackers to upload arbitrary files, including mali
82 CVE-2022-25369
70.42%
98.6th 9.8 CVE-2022-25369 is an authentication bypass vulnerability in Dynamicweb CMS that allows unauthenticat
83 CVE-2025-49706
70.35%
98.6th 6.5 KEV CVE-2025-49706 is an improper authentication vulnerability in Microsoft SharePoint that allows unaut
84 CVE-2025-60787
70.31%
98.6th 7.2 MotionEye v0.43.1b4 and earlier contains an OS command injection vulnerability where authenticated a
85 CVE-2025-52367
70.01%
98.6th 5.4 A stored cross-site scripting (XSS) vulnerability in PivotX CMS v3.0.0 RC 3 allows remote attackers
86 CVE-2024-46981
69.35%
98.6th 7.0 This CVE describes a use-after-free vulnerability in Redis where an authenticated user can craft a m
87 CVE-2025-49704
69.3%
98.6th 8.8 KEV This CVE describes a code injection vulnerability in Microsoft Office SharePoint that allows authent
88 CVE-2025-54236
69.25%
98.6th 9.1 KEV CVE-2025-54236 is an improper input validation vulnerability in Adobe Commerce (Magento) that allows
89 CVE-2023-52163
69.15%
98.6th 8.8 KEV This vulnerability allows remote attackers to execute arbitrary commands on Digiever DS-2105 Pro dev
90 CVE-2025-40536
69.07%
98.6th 8.1 KEV SolarWinds Web Help Desk contains a security control bypass vulnerability that allows unauthenticate
91 CVE-2012-10060
69.06%
98.6th 9.8 CVE-2012-10060 is a critical stack-based buffer overflow vulnerability in Sysax Multi Server's SSH s
92 CVE-2025-2292
68.8%
98.6th 6.5 Xorcom CompletePBX versions through 5.2.35 contain an authenticated path traversal vulnerability in
93 CVE-2010-20121
68.64%
98.6th 9.8 EasyFTP Server versions up to 1.7.0.11 contain a critical stack-based buffer overflow vulnerability
94 CVE-2025-11371
68.16%
98.6th 7.5 KEV An unauthenticated Local File Inclusion vulnerability in Gladinet CentreStack and TrioFox allows att
95 CVE-2025-2775
67.78%
98.5th 9.3 KEV SysAid On-Prem versions up to 23.3.40 contain an unauthenticated XML External Entity (XXE) vulnerabi
96 CVE-2024-55964
67.34%
98.5th 9.8 This vulnerability allows authenticated attackers to execute arbitrary commands within Appsmith Dock
97 CVE-2025-52053
67.31%
98.5th 9.8 This is a critical command injection vulnerability in TOTOLINK X6000R routers that allows unauthenti
98 CVE-2024-12847
67.08%
98.5th 9.8 This CVE describes an authentication bypass vulnerability in NETGEAR DGN1000 routers that allows rem
99 CVE-2024-58136
67.06%
98.5th 9.0 KEV This CVE describes a security regression in Yii 2 framework where improper handling of behavior atta
100 CVE-2025-32375
66.16%
98.5th 9.8 CVE-2025-32375 is an insecure deserialization vulnerability in BentoML's runner server that allows r

What is EPSS?

The Exploit Prediction Scoring System (EPSS) is a data-driven model developed by FIRST.org that estimates the probability a CVE will be exploited in the wild within the next 30 days. Unlike CVSS which measures severity, EPSS measures likelihood of exploitation — making it ideal for prioritizing which vulnerabilities to patch first.

Why EPSS matters: With thousands of CVEs published monthly, not all vulnerabilities are equally dangerous. EPSS helps security teams focus on the CVEs most likely to be actively exploited, rather than patching solely by CVSS score. A critical CVSS 9.8 vulnerability with 0.1% EPSS may be less urgent than a high CVSS 7.5 with 90% EPSS.

Prioritize by Exploit Risk

Scan your servers and see which vulnerabilities have the highest EPSS scores. Focus on what attackers are actually targeting.

Start Monitoring Free