Most Exploitable CVEs - EPSS Rankings
CVEs ranked by EPSS (Exploit Prediction Scoring System) probability. Higher scores mean a greater likelihood of exploitation in the wild within the next 30 days.
| Rank | CVE ID | EPSS Score | Percentile | CVSS | Flags | Summary |
|---|---|---|---|---|---|---|
| 51 | CVE-2015-10140 |
|
97.8th | 8.8 | The Ajax Load More WordPress plugin before version 2.8.1.2 lacks proper authorization checks in cert | |
| 52 | CVE-2015-10134 |
|
97.8th | 7.5 | The Simple Backup WordPress plugin allows attackers to download any file from the server without aut | |
| 53 | CVE-2025-34088 |
|
97.7th | 8.8 | This vulnerability allows authenticated users in Pandora FMS to execute arbitrary operating system c | |
| 54 | CVE-2025-26682 |
|
97.7th | 7.5 | This CVE describes a resource exhaustion vulnerability in ASP.NET Core where an attacker can send sp | |
| 55 | CVE-2025-33073 |
|
97.7th | 8.8 | KEV | CVE-2025-33073 is an improper access control vulnerability in Windows SMB that allows authenticated |
| 56 | CVE-2025-2011 |
|
97.6th | 7.5 | This SQL injection vulnerability in the Slider & Popup Builder by Depicter WordPress plugin allows u | |
| 57 | CVE-2025-26673 |
|
97.6th | 7.5 | This vulnerability allows an unauthorized attacker to cause a denial of service (DoS) on Windows sys | |
| 58 | CVE-2025-27920 |
|
97.5th | 7.2 | KEV | CVE-2025-27920 is a directory traversal vulnerability in Output Messenger that allows attackers to a |
| 59 | CVE-2025-22896 |
|
97.5th | 8.6 | mySCADA myPRO Manager stores credentials in cleartext, allowing attackers to read sensitive authenti | |
| 60 | CVE-2025-2783 |
|
97.5th | 8.3 | KEV | This vulnerability in Google Chrome's Mojo IPC system on Windows allows remote attackers to escape t |
| 61 | CVE-2025-27473 |
|
97.5th | 7.5 | This vulnerability in Windows HTTP.sys allows unauthorized attackers to cause denial of service by c | |
| 62 | CVE-2025-26680 |
|
97.5th | 7.5 | This vulnerability in Windows Standards-Based Storage Management Service allows unauthorized attacke | |
| 63 | CVE-2025-26652 |
|
97.5th | 7.5 | This vulnerability allows unauthorized attackers to cause denial of service in Windows Standards-Bas | |
| 64 | CVE-2025-26641 |
|
97.5th | 7.5 | This vulnerability in Windows Cryptographic Services allows attackers to cause denial of service by | |
| 65 | CVE-2025-34442 |
|
97.3th | 7.5 | AVideo versions before 20.1 expose absolute server filesystem paths through public API endpoints. Th | |
| 66 | CVE-2025-34441 |
|
97.3th | 7.5 | AVideo versions before 20.1 expose sensitive user information through an unauthenticated public API | |
| 67 | CVE-2025-27479 |
|
97.3th | 7.5 | This vulnerability in Windows Kerberos allows attackers to exhaust resource pools, causing denial of | |
| 68 | CVE-2025-27470 |
|
97.3th | 7.5 | This vulnerability in Windows Standards-Based Storage Management Service allows unauthorized attacke | |
| 69 | CVE-2024-13496 |
|
97.2th | 7.5 | CVE-2024-13496 is a time-based SQL injection vulnerability in the GamiPress WordPress plugin that al | |
| 70 | CVE-2025-61884 |
|
97.2th | 7.5 | KEV | This is a path traversal vulnerability (CWE-22) in Oracle Configurator within Oracle E-Business Suit |
| 71 | CVE-2024-40891 |
|
97.2th | 8.8 | KEV | This is a post-authentication command injection vulnerability in Zyxel VMG4325-B10A DSL CPE devices. |
| 72 | CVE-2024-13158 |
|
97.2th | 7.2 | This vulnerability allows remote authenticated attackers with admin privileges to execute arbitrary | |
| 73 | CVE-2025-66294 |
|
97.1th | 8.8 | This Server-Side Template Injection (SSTI) vulnerability in Grav allows authenticated users with edi | |
| 74 | CVE-2025-21174 |
|
97.1th | 7.5 | This vulnerability in Windows Standards-Based Storage Management Service allows unauthorized attacke | |
| 75 | CVE-2025-12055 |
|
97.1th | 7.5 | This vulnerability allows unauthenticated attackers to read arbitrary files from the Windows operati | |
| 76 | CVE-2024-51442 |
|
97th | 8.8 | CVE-2024-51442 is a command injection vulnerability in MiniDLNA v1.3.3 and earlier that allows attac | |
| 77 | CVE-2025-6970 |
|
97th | 7.5 | This vulnerability allows unauthenticated attackers to perform time-based SQL injection attacks on W | |
| 78 | CVE-2025-25064 |
|
97th | 8.8 | This SQL injection vulnerability in Zimbra Collaboration's ZimbraSync Service SOAP endpoint allows a | |
| 79 | CVE-2025-29793 |
|
97th | 7.2 | This vulnerability allows an authenticated attacker to execute arbitrary code on Microsoft SharePoin | |
| 80 | CVE-2025-33053 |
|
97th | 8.8 | KEV | This vulnerability allows attackers to execute arbitrary code by exploiting external control of file |
| 81 | CVE-2024-13346 |
|
96.9th | 7.3 | This vulnerability allows unauthenticated attackers to execute arbitrary shortcodes in the Avada Wor | |
| 82 | CVE-2025-27485 |
|
96.9th | 7.5 | CVE-2025-27485 is a denial-of-service vulnerability in Windows Standards-Based Storage Management Se | |
| 83 | CVE-2025-0411 |
|
96.8th | 7.0 | KEV | This vulnerability allows attackers to bypass Windows' Mark-of-the-Web security feature when extract |
| 84 | CVE-2024-55555 |
|
96.8th | 8.8 | CVE-2024-55555 is an unauthenticated remote code execution vulnerability in Invoice Ninja that allow | |
| 85 | CVE-2024-11423 |
|
96.7th | 7.5 | This vulnerability allows unauthenticated attackers to manipulate gift card balances in WooCommerce | |
| 86 | CVE-2024-12404 |
|
96.7th | 7.5 | The CF Internal Link Shortcode WordPress plugin contains an SQL injection vulnerability in all versi | |
| 87 | CVE-2025-22510 |
|
96.6th | 7.2 | This CVE describes a PHP object injection vulnerability in the WC Price History for Omnibus WordPres | |
| 88 | CVE-2025-24514 |
|
96.6th | 8.8 | This vulnerability allows attackers to inject malicious configuration into ingress-nginx via the aut | |
| 89 | CVE-2025-68645 |
|
96.5th | 8.8 | KEV | An unauthenticated remote attacker can exploit this Local File Inclusion vulnerability in Zimbra Col |
| 90 | CVE-2024-10936 |
|
96.5th | 8.8 | The String Locator WordPress plugin is vulnerable to PHP object injection through deserialization of | |
| 91 | CVE-2025-23094 |
|
96.4th | 7.3 | This CVE describes a command injection vulnerability in Mitel OpenScape 4000 and OpenScape 4000 Mana | |
| 92 | CVE-2025-30285 |
|
96.4th | 8.4 | This CVE describes a deserialization vulnerability in Adobe ColdFusion that allows arbitrary code ex | |
| 93 | CVE-2025-12139 |
|
96.3th | 7.5 | This vulnerability in the File Manager for Google Drive WordPress plugin exposes sensitive Google OA | |
| 94 | CVE-2025-13138 |
|
96.3th | 7.5 | This SQL injection vulnerability in the WP Directory Kit WordPress plugin allows unauthenticated att | |
| 95 | CVE-2025-21181 |
|
96.3th | 7.5 | A denial-of-service vulnerability in Microsoft Message Queuing (MSMQ) allows attackers to crash the | |
| 96 | CVE-2025-21285 |
|
96.2th | 7.5 | This vulnerability in Microsoft Message Queuing (MSMQ) allows attackers to cause a denial of service | |
| 97 | CVE-2024-8859 |
|
96.2th | 7.5 | A path traversal vulnerability in MLflow 2.15.1 allows attackers to read arbitrary files when the DB | |
| 98 | CVE-2025-46817 |
|
96.1th | 7.0 | This CVE describes an integer overflow vulnerability in Redis that allows authenticated users to exe | |
| 99 | CVE-2025-23120 |
|
96.1th | 8.8 | This vulnerability allows remote code execution (RCE) for domain users in Veeam Backup & Replication | |
| 100 | CVE-2025-24989 |
|
96.1th | 8.2 | KEV | An improper access control vulnerability in Microsoft Power Pages allows unauthorized attackers to b |
What is EPSS?
The Exploit Prediction Scoring System (EPSS) is a data-driven model developed by FIRST.org that estimates the probability a CVE will be exploited in the wild within the next 30 days. Unlike CVSS which measures severity, EPSS measures likelihood of exploitation — making it ideal for prioritizing which vulnerabilities to patch first.
Why EPSS matters: With thousands of CVEs published monthly, not all vulnerabilities are equally dangerous. EPSS helps security teams focus on the CVEs most likely to be actively exploited, rather than patching solely by CVSS score. A critical CVSS 9.8 vulnerability with 0.1% EPSS may be less urgent than a high CVSS 7.5 with 90% EPSS.
Prioritize by Exploit Risk
Scan your servers and see which vulnerabilities have the highest EPSS scores. Focus on what attackers are actually targeting.
Start Monitoring Free