Most Exploitable CVEs - EPSS Rankings
CVEs ranked by EPSS (Exploit Prediction Scoring System) probability. Higher scores mean a greater likelihood of exploitation in the wild within the next 30 days.
| Rank | CVE ID | EPSS Score | Percentile | CVSS | Flags | Summary |
|---|---|---|---|---|---|---|
| 1051 | CVE-2025-14224 |
|
47th | 4.3 | A path traversal vulnerability in Yottamaster DM2, DM3, and DM200 NAS devices allows attackers to up | |
| 1052 | CVE-2024-12370 |
|
46.7th | 5.3 | The WP Hotel Booking plugin for WordPress has an authorization bypass vulnerability that allows unau | |
| 1053 | CVE-2025-27139 |
|
46.7th | 6.8 | This vulnerability allows attackers to inject malicious scripts into the preferences page of Combodo | |
| 1054 | CVE-2024-52364 |
|
46.7th | 5.4 | This CVE describes a cross-site scripting (XSS) vulnerability in IBM Cloud Pak for Business Automati | |
| 1055 | CVE-2025-2215 |
|
46.7th | 4.7 | This critical vulnerability in Doufox allows remote attackers to perform path traversal attacks by m | |
| 1056 | CVE-2025-2651 |
|
46.6th | 5.3 | This vulnerability in SourceCodester Online Eyewear Shop 1.0 allows attackers to view directory list | |
| 1057 | CVE-2025-23387 |
|
46.6th | 5.3 | This vulnerability allows unauthenticated attackers to list and delete CLI authentication tokens in | |
| 1058 | CVE-2025-9387 |
|
46.6th | 6.3 | This CVE describes an OS command injection vulnerability in DCN DCME-720 web management backend. Att | |
| 1059 | CVE-2025-27399 |
|
46.5th | 5.3 | Mastodon instances with domain block visibility set to 'users' (logged-in users) inadvertently expos | |
| 1060 | CVE-2025-9575 |
|
46.5th | 6.3 | This CVE describes a remote command injection vulnerability in multiple Linksys RE-series Wi-Fi rang | |
| 1061 | CVE-2025-8830 |
|
46.5th | 6.3 | This CVE describes a remote command injection vulnerability in multiple Linksys RE-series range exte | |
| 1062 | CVE-2025-8829 |
|
46.5th | 6.3 | This CVE describes a remote command injection vulnerability in Linksys RE series range extenders. At | |
| 1063 | CVE-2025-8828 |
|
46.5th | 6.3 | This CVE describes an OS command injection vulnerability in Linksys WiFi range extenders that allows | |
| 1064 | CVE-2025-8821 |
|
46.5th | 6.3 | This CVE describes a command injection vulnerability in Linksys range extender firmware that allows | |
| 1065 | CVE-2024-40587 |
|
46.2th | 6.7 | This CVE describes an OS command injection vulnerability in Fortinet FortiVoice phone systems. Authe | |
| 1066 | CVE-2025-0821 |
|
46.2th | 6.5 | The Bit Assist WordPress plugin contains a time-based SQL injection vulnerability in all versions up | |
| 1067 | CVE-2021-27017 |
|
46.3th | 6.6 | CVE-2021-27017 is a deserialization vulnerability in Puppet Agent that allows attackers to execute a | |
| 1068 | CVE-2025-0859 |
|
46.2th | 6.5 | This vulnerability in the BoldGrid Post and Page Builder WordPress plugin allows authenticated attac | |
| 1069 | CVE-2025-32993 |
|
46.2th | 6.5 | CVE-2025-32993 is a time-based blind SQL injection vulnerability in Vision Helpdesk's forgot passwor | |
| 1070 | CVE-2025-7083 |
|
46.2th | 6.3 | This critical vulnerability in Belkin F9K1122 routers allows remote attackers to execute arbitrary o | |
| 1071 | CVE-2025-23367 |
|
46th | 6.5 | This vulnerability allows users with Monitor or Auditor roles in Wildfly Server to suspend or resume | |
| 1072 | CVE-2025-30704 |
|
46th | 4.4 | A vulnerability in Oracle MySQL Server's Components Services allows high-privileged attackers with n | |
| 1073 | CVE-2025-48742 |
|
46th | 5.4 | This vulnerability in SIGB PMB installer allows remote attackers to execute arbitrary code on affect | |
| 1074 | CVE-2025-49832 |
|
46th | 6.5 | Asterisk has a vulnerability in its STIR/SHAKEN verification module that allows remote attackers to | |
| 1075 | CVE-2025-0615 |
|
46th | 5.3 | This input validation vulnerability in Qualifio's Wheel of Fortune allows attackers to bypass email | |
| 1076 | CVE-2023-46608 |
|
45.9th | 5.3 | This CVE describes a Missing Authorization vulnerability in the WPDO DoLogin Security WordPress plug | |
| 1077 | CVE-2024-13641 |
|
45.9th | 5.9 | This vulnerability allows unauthenticated attackers to access sensitive files stored in the '/wp-con | |
| 1078 | CVE-2024-54951 |
|
46th | 5.4 | Monica 4.1.2 contains a stored cross-site scripting (XSS) vulnerability in the 'HOW YOU MET' contact | |
| 1079 | CVE-2025-2152 |
|
45.9th | 6.3 | A critical heap-based buffer overflow vulnerability in Assimp's BaseImporter::ConvertToUTF8 function | |
| 1080 | CVE-2025-3557 |
|
46th | 4.3 | This CVE describes a Cross-Site Request Forgery (CSRF) vulnerability in ScriptAndTools eCommerce-web | |
| 1081 | CVE-2025-27099 |
|
45.9th | 4.8 | This CVE describes a stored cross-site scripting (XSS) vulnerability in Tuleap's tracker semantic ti | |
| 1082 | CVE-2025-14648 |
|
45.8th | 4.7 | This vulnerability allows remote attackers to execute arbitrary commands on DedeBIZ systems through | |
| 1083 | CVE-2024-46073 |
|
45.7th | 6.1 | A reflected Cross-Site Scripting (XSS) vulnerability in IceHRM v32.4.0.OS allows attackers to execut | |
| 1084 | CVE-2024-57685 |
|
45.7th | 5.3 | This vulnerability allows remote attackers to execute arbitrary code on systems running vulnerable v | |
| 1085 | CVE-2025-32383 |
|
45.7th | 4.3 | A reverse shell vulnerability in MaxKB's function library module allows privileged users to execute | |
| 1086 | CVE-2025-15192 |
|
45.7th | 6.3 | This CVE describes a command injection vulnerability in D-Link DWR-M920 routers that allows remote a | |
| 1087 | CVE-2025-15191 |
|
45.7th | 6.3 | This CVE describes a command injection vulnerability in D-Link DWR-M920 routers that allows remote a | |
| 1088 | CVE-2024-56266 |
|
45.6th | 6.3 | This CVE describes a Missing Authorization vulnerability in the Sonaar Music MP3 Audio Player WordPr | |
| 1089 | CVE-2025-3739 |
|
45.6th | 5.9 | This vulnerability affects the Drupal 8 Google Optimize Hide Page module, allowing attackers to bypa | |
| 1090 | CVE-2025-3733 |
|
45.6th | 6.5 | This CVE describes a Cross-Site Scripting (XSS) vulnerability in the Drupal baguetteBox.Js module. A | |
| 1091 | CVE-2025-3561 |
|
45.6th | 4.3 | This vulnerability in ghostxbh uzy-ssm-mall 1.0.0 allows attackers to perform cross-site request for | |
| 1092 | CVE-2025-26335 |
|
45.6th | 5.8 | Dell PowerProtect Cyber Recovery versions before 19.18.0.2 expose sensitive information in sent data | |
| 1093 | CVE-2024-52279 |
|
45.6th | 5.3 | This vulnerability allows attackers to bypass JDBC URL validation in Apache Zeppelin by using URL-en | |
| 1094 | CVE-2025-15138 |
|
45.7th | 4.7 | This vulnerability in TinyFileManager allows attackers to perform path traversal attacks by manipula | |
| 1095 | CVE-2025-22739 |
|
45.5th | 5.3 | This CVE describes a missing authorization vulnerability in the LearnPress WordPress plugin that all | |
| 1096 | CVE-2025-30830 |
|
45.5th | 5.3 | This CVE describes a Missing Authorization vulnerability in the Hossni Mubarak Cool Author Box WordP | |
| 1097 | CVE-2025-30591 |
|
45.5th | 5.3 | This CVE describes a Missing Authorization vulnerability in the Music Press Pro WordPress plugin tha | |
| 1098 | CVE-2025-22232 |
|
45.5th | 5.3 | Spring Cloud Config Server may ignore client-provided Vault tokens via X-CONFIG-TOKEN header, causin | |
| 1099 | CVE-2025-26480 |
|
45.5th | 5.3 | Dell PowerScale OneFS versions 9.5.0.0 through 9.10.0.0 contain an uncontrolled resource consumption | |
| 1100 | CVE-2025-31012 |
|
45.5th | 5.3 | This CVE describes a missing authorization vulnerability in the Age Gate WordPress plugin that allow |
What is EPSS?
The Exploit Prediction Scoring System (EPSS) is a data-driven model developed by FIRST.org that estimates the probability a CVE will be exploited in the wild within the next 30 days. Unlike CVSS which measures severity, EPSS measures likelihood of exploitation — making it ideal for prioritizing which vulnerabilities to patch first.
Why EPSS matters: With thousands of CVEs published monthly, not all vulnerabilities are equally dangerous. EPSS helps security teams focus on the CVEs most likely to be actively exploited, rather than patching solely by CVSS score. A critical CVSS 9.8 vulnerability with 0.1% EPSS may be less urgent than a high CVSS 7.5 with 90% EPSS.
Prioritize by Exploit Risk
Scan your servers and see which vulnerabilities have the highest EPSS scores. Focus on what attackers are actually targeting.
Start Monitoring Free