Most Exploitable CVEs - EPSS Rankings

CVEs ranked by EPSS (Exploit Prediction Scoring System) probability. Higher scores mean a greater likelihood of exploitation in the wild within the next 30 days.

164
EPSS > 50%
156
CISA KEV Listed
35,468
CVEs with EPSS
0.7%
Avg EPSS Score
All Critical High Medium Low
Rank CVE ID EPSS Score Percentile CVSS Flags Summary
51 CVE-2015-10140
50.29%
97.8th 8.8 The Ajax Load More WordPress plugin before version 2.8.1.2 lacks proper authorization checks in cert
52 CVE-2015-10134
50.29%
97.8th 7.5 The Simple Backup WordPress plugin allows attackers to download any file from the server without aut
53 CVE-2025-34088
49.71%
97.7th 8.8 This vulnerability allows authenticated users in Pandora FMS to execute arbitrary operating system c
54 CVE-2025-26682
49.07%
97.7th 7.5 This CVE describes a resource exhaustion vulnerability in ASP.NET Core where an attacker can send sp
55 CVE-2025-33073
48.93%
97.7th 8.8 KEV CVE-2025-33073 is an improper access control vulnerability in Windows SMB that allows authenticated
56 CVE-2025-2011
47.09%
97.6th 7.5 This SQL injection vulnerability in the Slider & Popup Builder by Depicter WordPress plugin allows u
57 CVE-2025-26673
46.17%
97.6th 7.5 This vulnerability allows an unauthorized attacker to cause a denial of service (DoS) on Windows sys
58 CVE-2025-27920
46.08%
97.5th 7.2 KEV CVE-2025-27920 is a directory traversal vulnerability in Output Messenger that allows attackers to a
59 CVE-2025-22896
45.91%
97.5th 8.6 mySCADA myPRO Manager stores credentials in cleartext, allowing attackers to read sensitive authenti
60 CVE-2025-2783
44.72%
97.5th 8.3 KEV This vulnerability in Google Chrome's Mojo IPC system on Windows allows remote attackers to escape t
61 CVE-2025-27473
44.42%
97.5th 7.5 This vulnerability in Windows HTTP.sys allows unauthorized attackers to cause denial of service by c
62 CVE-2025-26680
44.42%
97.5th 7.5 This vulnerability in Windows Standards-Based Storage Management Service allows unauthorized attacke
63 CVE-2025-26652
44.42%
97.5th 7.5 This vulnerability allows unauthorized attackers to cause denial of service in Windows Standards-Bas
64 CVE-2025-26641
44.42%
97.5th 7.5 This vulnerability in Windows Cryptographic Services allows attackers to cause denial of service by
65 CVE-2025-34442
42.26%
97.3th 7.5 AVideo versions before 20.1 expose absolute server filesystem paths through public API endpoints. Th
66 CVE-2025-34441
42.26%
97.3th 7.5 AVideo versions before 20.1 expose sensitive user information through an unauthenticated public API
67 CVE-2025-27479
41.5%
97.3th 7.5 This vulnerability in Windows Kerberos allows attackers to exhaust resource pools, causing denial of
68 CVE-2025-27470
41.5%
97.3th 7.5 This vulnerability in Windows Standards-Based Storage Management Service allows unauthorized attacke
69 CVE-2024-13496
40.34%
97.2th 7.5 CVE-2024-13496 is a time-based SQL injection vulnerability in the GamiPress WordPress plugin that al
70 CVE-2025-61884
40.22%
97.2th 7.5 KEV This is a path traversal vulnerability (CWE-22) in Oracle Configurator within Oracle E-Business Suit
71 CVE-2024-40891
39.3%
97.2th 8.8 KEV This is a post-authentication command injection vulnerability in Zyxel VMG4325-B10A DSL CPE devices.
72 CVE-2024-13158
39.2%
97.2th 7.2 This vulnerability allows remote authenticated attackers with admin privileges to execute arbitrary
73 CVE-2025-66294
38.34%
97.1th 8.8 This Server-Side Template Injection (SSTI) vulnerability in Grav allows authenticated users with edi
74 CVE-2025-21174
37.89%
97.1th 7.5 This vulnerability in Windows Standards-Based Storage Management Service allows unauthorized attacke
75 CVE-2025-12055
37.2%
97.1th 7.5 This vulnerability allows unauthenticated attackers to read arbitrary files from the Windows operati
76 CVE-2024-51442
36.3%
97th 8.8 CVE-2024-51442 is a command injection vulnerability in MiniDLNA v1.3.3 and earlier that allows attac
77 CVE-2025-6970
36.24%
97th 7.5 This vulnerability allows unauthenticated attackers to perform time-based SQL injection attacks on W
78 CVE-2025-25064
36.22%
97th 8.8 This SQL injection vulnerability in Zimbra Collaboration's ZimbraSync Service SOAP endpoint allows a
79 CVE-2025-29793
35.99%
97th 7.2 This vulnerability allows an authenticated attacker to execute arbitrary code on Microsoft SharePoin
80 CVE-2025-33053
35.63%
97th 8.8 KEV This vulnerability allows attackers to execute arbitrary code by exploiting external control of file
81 CVE-2024-13346
35.44%
96.9th 7.3 This vulnerability allows unauthenticated attackers to execute arbitrary shortcodes in the Avada Wor
82 CVE-2025-27485
35.07%
96.9th 7.5 CVE-2025-27485 is a denial-of-service vulnerability in Windows Standards-Based Storage Management Se
83 CVE-2025-0411
33.82%
96.8th 7.0 KEV This vulnerability allows attackers to bypass Windows' Mark-of-the-Web security feature when extract
84 CVE-2024-55555
33.25%
96.8th 8.8 CVE-2024-55555 is an unauthenticated remote code execution vulnerability in Invoice Ninja that allow
85 CVE-2024-11423
32.2%
96.7th 7.5 This vulnerability allows unauthenticated attackers to manipulate gift card balances in WooCommerce
86 CVE-2024-12404
31.98%
96.7th 7.5 The CF Internal Link Shortcode WordPress plugin contains an SQL injection vulnerability in all versi
87 CVE-2025-22510
31.25%
96.6th 7.2 This CVE describes a PHP object injection vulnerability in the WC Price History for Omnibus WordPres
88 CVE-2025-24514
30.5%
96.6th 8.8 This vulnerability allows attackers to inject malicious configuration into ingress-nginx via the aut
89 CVE-2025-68645
29.35%
96.5th 8.8 KEV An unauthenticated remote attacker can exploit this Local File Inclusion vulnerability in Zimbra Col
90 CVE-2024-10936
29.15%
96.5th 8.8 The String Locator WordPress plugin is vulnerable to PHP object injection through deserialization of
91 CVE-2025-23094
28.95%
96.4th 7.3 This CVE describes a command injection vulnerability in Mitel OpenScape 4000 and OpenScape 4000 Mana
92 CVE-2025-30285
28.07%
96.4th 8.4 This CVE describes a deserialization vulnerability in Adobe ColdFusion that allows arbitrary code ex
93 CVE-2025-12139
27.75%
96.3th 7.5 This vulnerability in the File Manager for Google Drive WordPress plugin exposes sensitive Google OA
94 CVE-2025-13138
27.65%
96.3th 7.5 This SQL injection vulnerability in the WP Directory Kit WordPress plugin allows unauthenticated att
95 CVE-2025-21181
27.13%
96.3th 7.5 A denial-of-service vulnerability in Microsoft Message Queuing (MSMQ) allows attackers to crash the
96 CVE-2025-21285
26.94%
96.2th 7.5 This vulnerability in Microsoft Message Queuing (MSMQ) allows attackers to cause a denial of service
97 CVE-2024-8859
26.92%
96.2th 7.5 A path traversal vulnerability in MLflow 2.15.1 allows attackers to read arbitrary files when the DB
98 CVE-2025-46817
25.89%
96.1th 7.0 This CVE describes an integer overflow vulnerability in Redis that allows authenticated users to exe
99 CVE-2025-23120
25.83%
96.1th 8.8 This vulnerability allows remote code execution (RCE) for domain users in Veeam Backup & Replication
100 CVE-2025-24989
25.71%
96.1th 8.2 KEV An improper access control vulnerability in Microsoft Power Pages allows unauthorized attackers to b

What is EPSS?

The Exploit Prediction Scoring System (EPSS) is a data-driven model developed by FIRST.org that estimates the probability a CVE will be exploited in the wild within the next 30 days. Unlike CVSS which measures severity, EPSS measures likelihood of exploitation — making it ideal for prioritizing which vulnerabilities to patch first.

Why EPSS matters: With thousands of CVEs published monthly, not all vulnerabilities are equally dangerous. EPSS helps security teams focus on the CVEs most likely to be actively exploited, rather than patching solely by CVSS score. A critical CVSS 9.8 vulnerability with 0.1% EPSS may be less urgent than a high CVSS 7.5 with 90% EPSS.

Prioritize by Exploit Risk

Scan your servers and see which vulnerabilities have the highest EPSS scores. Focus on what attackers are actually targeting.

Start Monitoring Free