Most Exploitable CVEs - EPSS Rankings
CVEs ranked by EPSS (Exploit Prediction Scoring System) probability. Higher scores mean a greater likelihood of exploitation in the wild within the next 30 days.
| Rank | CVE ID | EPSS Score | Percentile | CVSS | Flags | Summary |
|---|---|---|---|---|---|---|
| 1001 | CVE-2025-26927 |
|
61.1th | 10.0 | This critical vulnerability in the EPC AI Hub WordPress plugin allows attackers to upload arbitrary | |
| 1002 | CVE-2025-11200 |
|
61th | 9.8 | This vulnerability allows remote attackers to bypass authentication in MLflow installations due to w | |
| 1003 | CVE-2024-8502 |
|
61th | 9.8 | This vulnerability allows remote attackers to execute arbitrary code on servers running modelscope/a | |
| 1004 | CVE-2025-6559 |
|
61th | 9.8 | Multiple Sapido wireless router models contain an unauthenticated remote OS command injection vulner | |
| 1005 | CVE-2025-48626 |
|
61th | 9.8 | This Android vulnerability allows attackers to launch applications from the background without user | |
| 1006 | CVE-2025-4104 |
|
60.9th | 9.8 | The Frontend Dashboard WordPress plugin versions 1.0 to 2.2.6 contain a privilege escalation vulnera | |
| 1007 | CVE-2025-67489 |
|
60.9th | 9.8 | CVE-2025-67489 allows remote attackers to execute arbitrary code on Vite development servers using v | |
| 1008 | CVE-2025-27096 |
|
60.8th | 9.8 | A SQL injection vulnerability in WeGIA's personalizacao_upload.php endpoint allows authenticated att | |
| 1009 | CVE-2025-26610 |
|
60.8th | 9.8 | A SQL injection vulnerability in WeGIA's restaurar_produto_desocultar.php endpoint allows authentica | |
| 1010 | CVE-2025-3623 |
|
60.8th | 9.1 | The Uncanny Automator WordPress plugin contains a PHP object injection vulnerability that allows una | |
| 1011 | CVE-2025-9809 |
|
60.6th | 9.8 | This vulnerability allows remote attackers to execute arbitrary code by providing a specially crafte | |
| 1012 | CVE-2025-46122 |
|
60.6th | 9.1 | This vulnerability allows authenticated attackers to execute arbitrary commands as root on Ruckus Un | |
| 1013 | CVE-2025-24957 |
|
60.5th | 9.8 | This SQL injection vulnerability in WeGIA's get_detalhes_socio.php endpoint allows authenticated att | |
| 1014 | CVE-2025-24905 |
|
60.5th | 9.8 | CVE-2025-24905 is a critical SQL injection vulnerability in WeGIA's get_codigobarras_cobranca.php en | |
| 1015 | CVE-2025-8854 |
|
60.5th | 9.8 | A stack-based buffer overflow vulnerability in bulletphysics bullet3's LoadOFF function allows remot | |
| 1016 | CVE-2025-20260 |
|
60.4th | 9.8 | A critical buffer overflow vulnerability in ClamAV's PDF scanning allows remote attackers to crash t | |
| 1017 | CVE-2025-5309 |
|
60.4th | 9.8 | A Server-Side Template Injection vulnerability in BeyondTrust's Remote Support and Privileged Remote | |
| 1018 | CVE-2025-50475 |
|
60.5th | 9.8 | An unauthenticated OS command injection vulnerability in Russound MBX-PRE-D67F firmware allows attac | |
| 1019 | CVE-2025-30841 |
|
60.4th | 9.9 | This path traversal vulnerability in the Countdown & Clock WordPress plugin allows attackers to incl | |
| 1020 | CVE-2026-2095 |
|
60.2th | 9.8 | Agentflow software from Flowring contains an authentication bypass vulnerability that allows unauthe | |
| 1021 | CVE-2025-61808 |
|
60.2th | 9.1 | This vulnerability allows high-privileged attackers to upload dangerous file types to ColdFusion ser | |
| 1022 | CVE-2026-1357 |
|
60.1th | 9.8 | This vulnerability allows unauthenticated attackers to upload arbitrary PHP files to WordPress sites | |
| 1023 | CVE-2025-53766 |
|
60th | 9.8 | A heap-based buffer overflow vulnerability in Windows GDI+ allows remote attackers to execute arbitr | |
| 1024 | CVE-2025-31691 |
|
59.9th | 9.8 | This vulnerability allows attackers to bypass authorization checks in Drupal OAuth2 Server through f | |
| 1025 | CVE-2025-29315 |
|
59.9th | 9.8 | This vulnerability allows attackers to bypass Shiro-based RBAC controls in OpenDaylight SFC, enablin | |
| 1026 | CVE-2024-55573 |
|
59.8th | 9.1 | A critical SQL injection vulnerability in Centreon centreon-web allows authenticated users with high | |
| 1027 | CVE-2025-26325 |
|
59.8th | 9.8 | ShopXO 6.4.0 contains an unrestricted file upload vulnerability in ThemeDataService.php that allows | |
| 1028 | CVE-2024-29643 |
|
59.8th | 9.1 | This vulnerability allows attackers to perform Host header injection in Croogo v3.0.2 via the feed.r | |
| 1029 | CVE-2023-54329 |
|
59.8th | 9.8 | CVE-2023-54329 is a critical remote command execution vulnerability in Inbit Messenger versions 4.6. | |
| 1030 | CVE-2025-0867 |
|
59.7th | 9.9 | This vulnerability allows standard users to execute commands with administrative privileges through | |
| 1031 | CVE-2025-32583 |
|
59.7th | 9.9 | This vulnerability allows remote attackers to execute arbitrary code on systems running vulnerable v | |
| 1032 | CVE-2025-31715 |
|
59.6th | 9.8 | CVE-2025-31715 is a command injection vulnerability in vowifi service that allows remote attackers t | |
| 1033 | CVE-2025-12871 |
|
59.7th | 9.8 | CVE-2025-12871 is an authentication abuse vulnerability in a+HRD software that allows unauthenticate | |
| 1034 | CVE-2025-22937 |
|
59.5th | 9.8 | This vulnerability in Adtran 411 ONT devices allows attackers to escalate privileges from a lower-pr | |
| 1035 | CVE-2025-31330 |
|
59.5th | 9.9 | CVE-2025-31330 is a critical code injection vulnerability in SAP Landscape Transformation (SLT) that | |
| 1036 | CVE-2025-27429 |
|
59.5th | 9.9 | This critical vulnerability in SAP S/4HANA allows authenticated users to inject arbitrary ABAP code | |
| 1037 | CVE-2024-45438 |
|
59.5th | 9.1 | CVE-2024-45438 is an authentication bypass vulnerability in TitanHQ SpamTitan Email Security Gateway | |
| 1038 | CVE-2025-6688 |
|
59.5th | 9.8 | The Simple Payment WordPress plugin contains an authentication bypass vulnerability that allows unau | |
| 1039 | CVE-2025-4973 |
|
59.5th | 9.8 | The Workreap WordPress plugin has an authentication bypass vulnerability that allows unauthenticated | |
| 1040 | CVE-2025-24102 |
|
59.3th | 9.8 | This CVE describes an information disclosure vulnerability in Apple operating systems where an app c | |
| 1041 | CVE-2025-47781 |
|
59.3th | 9.8 | CVE-2025-47781 allows unauthenticated attackers to brute-force 6-digit authentication tokens in Rall | |
| 1042 | CVE-2025-62521 |
|
59.3th | 10.0 | CVE-2025-62521 is a critical pre-authentication remote code execution vulnerability in ChurchCRM tha | |
| 1043 | CVE-2025-9113 |
|
59.2th | 9.8 | The Doccure WordPress theme allows unauthenticated attackers to upload arbitrary files due to missin | |
| 1044 | CVE-2024-49688 |
|
59.2th | 9.8 | This vulnerability allows unauthenticated attackers to perform PHP object injection through deserial | |
| 1045 | CVE-2025-1066 |
|
59.1th | 9.8 | OpenPLC_V3 contains an arbitrary file upload vulnerability that allows attackers to upload malicious | |
| 1046 | CVE-2025-3603 |
|
59.1th | 9.8 | The Flynax Bridge WordPress plugin has a critical authentication bypass vulnerability that allows un | |
| 1047 | CVE-2024-57473 |
|
59.1th | 9.8 | H3C N12 V100R005 routers contain a critical buffer overflow vulnerability in the MAC address editing | |
| 1048 | CVE-2024-57480 |
|
59.1th | 9.8 | H3C N12 V100R005 wireless access points contain a critical buffer overflow vulnerability in their we | |
| 1049 | CVE-2024-57471 |
|
59.1th | 9.8 | H3C N12 V100R005 wireless routers contain a buffer overflow vulnerability in their 2.4G wireless net | |
| 1050 | CVE-2025-26506 |
|
59.1th | 9.8 | This vulnerability allows attackers to execute arbitrary code with elevated privileges on affected H |
What is EPSS?
The Exploit Prediction Scoring System (EPSS) is a data-driven model developed by FIRST.org that estimates the probability a CVE will be exploited in the wild within the next 30 days. Unlike CVSS which measures severity, EPSS measures likelihood of exploitation — making it ideal for prioritizing which vulnerabilities to patch first.
Why EPSS matters: With thousands of CVEs published monthly, not all vulnerabilities are equally dangerous. EPSS helps security teams focus on the CVEs most likely to be actively exploited, rather than patching solely by CVSS score. A critical CVSS 9.8 vulnerability with 0.1% EPSS may be less urgent than a high CVSS 7.5 with 90% EPSS.
Prioritize by Exploit Risk
Scan your servers and see which vulnerabilities have the highest EPSS scores. Focus on what attackers are actually targeting.
Start Monitoring Free