Most Exploitable CVEs - EPSS Rankings

CVEs ranked by EPSS (Exploit Prediction Scoring System) probability. Higher scores mean a greater likelihood of exploitation in the wild within the next 30 days.

164
EPSS > 50%
156
CISA KEV Listed
35,468
CVEs with EPSS
0.7%
Avg EPSS Score
All Critical High Medium Low
Rank CVE ID EPSS Score Percentile CVSS Flags Summary
1051 CVE-2025-14224
0.24%
47th 4.3 A path traversal vulnerability in Yottamaster DM2, DM3, and DM200 NAS devices allows attackers to up
1052 CVE-2024-12370
0.24%
46.7th 5.3 The WP Hotel Booking plugin for WordPress has an authorization bypass vulnerability that allows unau
1053 CVE-2025-27139
0.24%
46.7th 6.8 This vulnerability allows attackers to inject malicious scripts into the preferences page of Combodo
1054 CVE-2024-52364
0.24%
46.7th 5.4 This CVE describes a cross-site scripting (XSS) vulnerability in IBM Cloud Pak for Business Automati
1055 CVE-2025-2215
0.24%
46.7th 4.7 This critical vulnerability in Doufox allows remote attackers to perform path traversal attacks by m
1056 CVE-2025-2651
0.24%
46.6th 5.3 This vulnerability in SourceCodester Online Eyewear Shop 1.0 allows attackers to view directory list
1057 CVE-2025-23387
0.24%
46.6th 5.3 This vulnerability allows unauthenticated attackers to list and delete CLI authentication tokens in
1058 CVE-2025-9387
0.24%
46.6th 6.3 This CVE describes an OS command injection vulnerability in DCN DCME-720 web management backend. Att
1059 CVE-2025-27399
0.24%
46.5th 5.3 Mastodon instances with domain block visibility set to 'users' (logged-in users) inadvertently expos
1060 CVE-2025-9575
0.24%
46.5th 6.3 This CVE describes a remote command injection vulnerability in multiple Linksys RE-series Wi-Fi rang
1061 CVE-2025-8830
0.24%
46.5th 6.3 This CVE describes a remote command injection vulnerability in multiple Linksys RE-series range exte
1062 CVE-2025-8829
0.24%
46.5th 6.3 This CVE describes a remote command injection vulnerability in Linksys RE series range extenders. At
1063 CVE-2025-8828
0.24%
46.5th 6.3 This CVE describes an OS command injection vulnerability in Linksys WiFi range extenders that allows
1064 CVE-2025-8821
0.24%
46.5th 6.3 This CVE describes a command injection vulnerability in Linksys range extender firmware that allows
1065 CVE-2024-40587
0.24%
46.2th 6.7 This CVE describes an OS command injection vulnerability in Fortinet FortiVoice phone systems. Authe
1066 CVE-2025-0821
0.24%
46.2th 6.5 The Bit Assist WordPress plugin contains a time-based SQL injection vulnerability in all versions up
1067 CVE-2021-27017
0.24%
46.3th 6.6 CVE-2021-27017 is a deserialization vulnerability in Puppet Agent that allows attackers to execute a
1068 CVE-2025-0859
0.24%
46.2th 6.5 This vulnerability in the BoldGrid Post and Page Builder WordPress plugin allows authenticated attac
1069 CVE-2025-32993
0.24%
46.2th 6.5 CVE-2025-32993 is a time-based blind SQL injection vulnerability in Vision Helpdesk's forgot passwor
1070 CVE-2025-7083
0.24%
46.2th 6.3 This critical vulnerability in Belkin F9K1122 routers allows remote attackers to execute arbitrary o
1071 CVE-2025-23367
0.24%
46th 6.5 This vulnerability allows users with Monitor or Auditor roles in Wildfly Server to suspend or resume
1072 CVE-2025-30704
0.24%
46th 4.4 A vulnerability in Oracle MySQL Server's Components Services allows high-privileged attackers with n
1073 CVE-2025-48742
0.24%
46th 5.4 This vulnerability in SIGB PMB installer allows remote attackers to execute arbitrary code on affect
1074 CVE-2025-49832
0.24%
46th 6.5 Asterisk has a vulnerability in its STIR/SHAKEN verification module that allows remote attackers to
1075 CVE-2025-0615
0.23%
46th 5.3 This input validation vulnerability in Qualifio's Wheel of Fortune allows attackers to bypass email
1076 CVE-2023-46608
0.23%
45.9th 5.3 This CVE describes a Missing Authorization vulnerability in the WPDO DoLogin Security WordPress plug
1077 CVE-2024-13641
0.23%
45.9th 5.9 This vulnerability allows unauthenticated attackers to access sensitive files stored in the '/wp-con
1078 CVE-2024-54951
0.23%
46th 5.4 Monica 4.1.2 contains a stored cross-site scripting (XSS) vulnerability in the 'HOW YOU MET' contact
1079 CVE-2025-2152
0.23%
45.9th 6.3 A critical heap-based buffer overflow vulnerability in Assimp's BaseImporter::ConvertToUTF8 function
1080 CVE-2025-3557
0.23%
46th 4.3 This CVE describes a Cross-Site Request Forgery (CSRF) vulnerability in ScriptAndTools eCommerce-web
1081 CVE-2025-27099
0.23%
45.9th 4.8 This CVE describes a stored cross-site scripting (XSS) vulnerability in Tuleap's tracker semantic ti
1082 CVE-2025-14648
0.23%
45.8th 4.7 This vulnerability allows remote attackers to execute arbitrary commands on DedeBIZ systems through
1083 CVE-2024-46073
0.23%
45.7th 6.1 A reflected Cross-Site Scripting (XSS) vulnerability in IceHRM v32.4.0.OS allows attackers to execut
1084 CVE-2024-57685
0.23%
45.7th 5.3 This vulnerability allows remote attackers to execute arbitrary code on systems running vulnerable v
1085 CVE-2025-32383
0.23%
45.7th 4.3 A reverse shell vulnerability in MaxKB's function library module allows privileged users to execute
1086 CVE-2025-15192
0.23%
45.7th 6.3 This CVE describes a command injection vulnerability in D-Link DWR-M920 routers that allows remote a
1087 CVE-2025-15191
0.23%
45.7th 6.3 This CVE describes a command injection vulnerability in D-Link DWR-M920 routers that allows remote a
1088 CVE-2024-56266
0.23%
45.6th 6.3 This CVE describes a Missing Authorization vulnerability in the Sonaar Music MP3 Audio Player WordPr
1089 CVE-2025-3739
0.23%
45.6th 5.9 This vulnerability affects the Drupal 8 Google Optimize Hide Page module, allowing attackers to bypa
1090 CVE-2025-3733
0.23%
45.6th 6.5 This CVE describes a Cross-Site Scripting (XSS) vulnerability in the Drupal baguetteBox.Js module. A
1091 CVE-2025-3561
0.23%
45.6th 4.3 This vulnerability in ghostxbh uzy-ssm-mall 1.0.0 allows attackers to perform cross-site request for
1092 CVE-2025-26335
0.23%
45.6th 5.8 Dell PowerProtect Cyber Recovery versions before 19.18.0.2 expose sensitive information in sent data
1093 CVE-2024-52279
0.23%
45.6th 5.3 This vulnerability allows attackers to bypass JDBC URL validation in Apache Zeppelin by using URL-en
1094 CVE-2025-15138
0.23%
45.7th 4.7 This vulnerability in TinyFileManager allows attackers to perform path traversal attacks by manipula
1095 CVE-2025-22739
0.23%
45.5th 5.3 This CVE describes a missing authorization vulnerability in the LearnPress WordPress plugin that all
1096 CVE-2025-30830
0.23%
45.5th 5.3 This CVE describes a Missing Authorization vulnerability in the Hossni Mubarak Cool Author Box WordP
1097 CVE-2025-30591
0.23%
45.5th 5.3 This CVE describes a Missing Authorization vulnerability in the Music Press Pro WordPress plugin tha
1098 CVE-2025-22232
0.23%
45.5th 5.3 Spring Cloud Config Server may ignore client-provided Vault tokens via X-CONFIG-TOKEN header, causin
1099 CVE-2025-26480
0.23%
45.5th 5.3 Dell PowerScale OneFS versions 9.5.0.0 through 9.10.0.0 contain an uncontrolled resource consumption
1100 CVE-2025-31012
0.23%
45.5th 5.3 This CVE describes a missing authorization vulnerability in the Age Gate WordPress plugin that allow

What is EPSS?

The Exploit Prediction Scoring System (EPSS) is a data-driven model developed by FIRST.org that estimates the probability a CVE will be exploited in the wild within the next 30 days. Unlike CVSS which measures severity, EPSS measures likelihood of exploitation — making it ideal for prioritizing which vulnerabilities to patch first.

Why EPSS matters: With thousands of CVEs published monthly, not all vulnerabilities are equally dangerous. EPSS helps security teams focus on the CVEs most likely to be actively exploited, rather than patching solely by CVSS score. A critical CVSS 9.8 vulnerability with 0.1% EPSS may be less urgent than a high CVSS 7.5 with 90% EPSS.

Prioritize by Exploit Risk

Scan your servers and see which vulnerabilities have the highest EPSS scores. Focus on what attackers are actually targeting.

Start Monitoring Free