Most Exploitable CVEs - EPSS Rankings
CVEs ranked by EPSS (Exploit Prediction Scoring System) probability. Higher scores mean a greater likelihood of exploitation in the wild within the next 30 days.
| Rank | CVE ID | EPSS Score | Percentile | CVSS | Flags | Summary |
|---|---|---|---|---|---|---|
| 1051 | CVE-2025-23114 |
|
59th | 9.0 | A TLS certificate validation vulnerability in Veeam Updater allows man-in-the-middle attackers to in | |
| 1052 | CVE-2025-12813 |
|
59th | 9.8 | The Holiday Class Post Calendar WordPress plugin has a critical remote code execution vulnerability | |
| 1053 | CVE-2025-14502 |
|
59th | 9.8 | The News and Blog Designer Bundle WordPress plugin has a Local File Inclusion vulnerability that all | |
| 1054 | CVE-2025-24981 |
|
58.9th | 9.3 | CVE-2025-24981 is a cross-site scripting (XSS) vulnerability in the MDC markdown parser that allows | |
| 1055 | CVE-2025-7921 |
|
58.9th | 9.8 | This critical vulnerability affects certain Askey modem models, allowing unauthenticated remote atta | |
| 1056 | CVE-2025-67418 |
|
59th | 9.8 | ClipBucket 5.5.2 ships with hardcoded default administrative credentials, allowing unauthenticated r | |
| 1057 | CVE-2023-53921 |
|
58.9th | 9.8 | SitemagicCMS 4.4.3 contains an unrestricted file upload vulnerability that allows attackers to uploa | |
| 1058 | CVE-2024-56156 |
|
58.9th | 9.0 | This vulnerability in Halo website building software allows attackers to bypass file upload validati | |
| 1059 | CVE-2025-39557 |
|
58.9th | 9.1 | This vulnerability allows unauthenticated attackers to upload arbitrary files, including web shells, | |
| 1060 | CVE-2025-32202 |
|
58.9th | 9.1 | This vulnerability allows unauthenticated attackers to upload arbitrary files, including web shells, | |
| 1061 | CVE-2025-31002 |
|
58.9th | 9.1 | CVE-2025-31002 is an arbitrary file upload vulnerability in the Squeeze WordPress plugin that allows | |
| 1062 | CVE-2025-31480 |
|
58.9th | 9.1 | This is a privilege escalation vulnerability in the aiven-extras PostgreSQL extension that allows at | |
| 1063 | CVE-2025-60803 |
|
58.9th | 9.8 | Antabot White-Jotter contains an unauthenticated remote code execution vulnerability that allows att | |
| 1064 | CVE-2026-25539 |
|
58.9th | 9.1 | This vulnerability allows authenticated users of SiYuan personal knowledge management system to writ | |
| 1065 | CVE-2025-26201 |
|
58.8th | 9.1 | GreaterWMS versions up to 2.1.49 contain an authentication bypass vulnerability in the /staff route | |
| 1066 | CVE-2024-38988 |
|
58.8th | 9.8 | CVE-2024-38988 is a prototype pollution vulnerability in alizeait unflatto versions up to 1.0.2 that | |
| 1067 | CVE-2025-30580 |
|
58.7th | 10.0 | This critical vulnerability allows remote attackers to execute arbitrary code on systems running vul | |
| 1068 | CVE-2025-43879 |
|
58.7th | 9.8 | This critical vulnerability allows remote unauthenticated attackers to execute arbitrary operating s | |
| 1069 | CVE-2025-21198 |
|
58.6th | 9.0 | This vulnerability allows remote attackers to execute arbitrary code on Microsoft HPC Pack systems w | |
| 1070 | CVE-2025-11522 |
|
58.6th | 9.8 | This vulnerability allows unauthenticated attackers to bypass authentication and take over any user | |
| 1071 | CVE-2024-12264 |
|
58.6th | 9.8 | This vulnerability allows unauthenticated attackers to create administrative user accounts on WordPr | |
| 1072 | CVE-2024-12402 |
|
58.6th | 9.8 | This vulnerability allows unauthenticated attackers to change any WordPress user's password, includi | |
| 1073 | CVE-2025-30465 |
|
58.6th | 9.8 | This CVE describes a permissions bypass vulnerability in Apple's Shortcuts app across multiple macOS | |
| 1074 | CVE-2024-10361 |
|
58.5th | 9.1 | This vulnerability allows attackers to delete arbitrary files on servers running vulnerable versions | |
| 1075 | CVE-2025-32931 |
|
58.6th | 9.1 | CVE-2025-32931 is an authenticated remote code execution vulnerability in DevDojo Voyager that allow | |
| 1076 | CVE-2025-43984 |
|
58.5th | 9.8 | This vulnerability allows remote unauthenticated attackers to execute arbitrary operating system com | |
| 1077 | CVE-2025-10230 |
|
58.5th | 10.0 | This critical vulnerability in Samba allows unauthenticated remote attackers to execute arbitrary co | |
| 1078 | CVE-2025-31685 |
|
58.4th | 9.1 | This CVE describes a Missing Authorization vulnerability in Drupal Open Social that allows Forceful | |
| 1079 | CVE-2025-52385 |
|
58.3th | 9.8 | This critical vulnerability in Studio 3T allows remote attackers to execute arbitrary code on affect | |
| 1080 | CVE-2025-39550 |
|
58.3th | 9.8 | CVE-2025-39550 is a PHP object injection vulnerability in the Shahjahan Jewel FluentCommunity WordPr | |
| 1081 | CVE-2025-32658 |
|
58.3th | 9.8 | This vulnerability allows attackers to execute arbitrary code on WordPress sites running the vulnera | |
| 1082 | CVE-2025-32572 |
|
58.3th | 9.8 | CVE-2025-32572 is a PHP object injection vulnerability in the Kata Plus WordPress plugin that allows | |
| 1083 | CVE-2025-27286 |
|
58.3th | 9.8 | This vulnerability allows remote attackers to execute arbitrary code through PHP object injection vi | |
| 1084 | CVE-2025-30985 |
|
58.3th | 9.8 | A PHP object injection vulnerability in GNUCommerce WordPress plugin allows attackers to execute arb | |
| 1085 | CVE-2025-32568 |
|
58.3th | 9.8 | This vulnerability allows attackers to inject malicious objects through deserialization of untrusted | |
| 1086 | CVE-2025-31612 |
|
58.3th | 9.8 | This vulnerability allows attackers to inject malicious PHP objects through deserialization of untru | |
| 1087 | CVE-2025-31084 |
|
58.3th | 9.8 | This vulnerability allows attackers to inject malicious objects through deserialization of untrusted | |
| 1088 | CVE-2025-32897 |
|
58.3th | 9.8 | This vulnerability allows attackers to execute arbitrary code by sending malicious serialized data t | |
| 1089 | CVE-2025-24297 |
|
58.1th | 9.8 | This vulnerability allows attackers to inject malicious JavaScript code into users' personal spaces | |
| 1090 | CVE-2025-53826 |
|
58.1th | 9.8 | File Browser version 2.39.0 has an authentication flaw where JWT tokens remain valid indefinitely ev | |
| 1091 | CVE-2025-30461 |
|
58.1th | 9.8 | This CVE describes a macOS sandbox bypass vulnerability where malicious applications can access prot | |
| 1092 | CVE-2025-24245 |
|
58.1th | 9.8 | This vulnerability allows malicious applications to bypass verification code rate limiting and acces | |
| 1093 | CVE-2025-2146 |
|
58.1th | 9.8 | A buffer overflow vulnerability in the WebService Authentication processing of Canon multifunction p | |
| 1094 | CVE-2025-32682 |
|
58th | 9.9 | This vulnerability allows attackers to upload arbitrary files, including web shells, to WordPress se | |
| 1095 | CVE-2025-32445 |
|
58th | 9.9 | This CVE allows authenticated users with EventSource/Sensor CRUD permissions in Argo Events to escal | |
| 1096 | CVE-2025-32140 |
|
58th | 9.9 | This vulnerability allows attackers to upload arbitrary files, including web shells, to WordPress se | |
| 1097 | CVE-2025-55315 |
|
58th | 9.9 | CVE-2025-55315 is an HTTP request smuggling vulnerability in ASP.NET Core that allows an authenticat | |
| 1098 | CVE-2025-67728 |
|
58th | 9.8 | CVE-2025-67728 is a command injection vulnerability in Fireshare that allows authenticated users (or | |
| 1099 | CVE-2024-13442 |
|
57.9th | 9.8 | This vulnerability allows unauthenticated attackers to take over any user account, including adminis | |
| 1100 | CVE-2025-27786 |
|
57.9th | 9.1 | Applio voice conversion tool versions 3.2.8-bugfix and prior contain a path traversal vulnerability |
What is EPSS?
The Exploit Prediction Scoring System (EPSS) is a data-driven model developed by FIRST.org that estimates the probability a CVE will be exploited in the wild within the next 30 days. Unlike CVSS which measures severity, EPSS measures likelihood of exploitation — making it ideal for prioritizing which vulnerabilities to patch first.
Why EPSS matters: With thousands of CVEs published monthly, not all vulnerabilities are equally dangerous. EPSS helps security teams focus on the CVEs most likely to be actively exploited, rather than patching solely by CVSS score. A critical CVSS 9.8 vulnerability with 0.1% EPSS may be less urgent than a high CVSS 7.5 with 90% EPSS.
Prioritize by Exploit Risk
Scan your servers and see which vulnerabilities have the highest EPSS scores. Focus on what attackers are actually targeting.
Start Monitoring Free