Most Exploitable CVEs - EPSS Rankings
CVEs ranked by EPSS (Exploit Prediction Scoring System) probability. Higher scores mean a greater likelihood of exploitation in the wild within the next 30 days.
| Rank | CVE ID | EPSS Score | Percentile | CVSS | Flags | Summary |
|---|---|---|---|---|---|---|
| 1201 | CVE-2025-14850 |
|
64.4th | 8.1 | Advantech WebAccess/SCADA is vulnerable to directory traversal that allows attackers to delete arbit | |
| 1202 | CVE-2025-32158 |
|
64.3th | 7.5 | This vulnerability allows attackers to include arbitrary PHP files from remote servers in the aTheme | |
| 1203 | CVE-2025-21177 |
|
64.3th | 8.7 | This Server-Side Request Forgery vulnerability in Microsoft Dynamics 365 Sales allows authenticated | |
| 1204 | CVE-2025-11673 |
|
64.2th | 7.2 | SOOP-CLM software from PiExtract contains hidden functionality that privileged remote attackers can | |
| 1205 | CVE-2024-57660 |
|
64.2th | 7.5 | A SQL injection vulnerability in the sqlo_expand_jts component of OpenLink Virtuoso Open Source allo | |
| 1206 | CVE-2024-52006 |
|
64.1th | 7.5 | This vulnerability allows attackers to inject malicious commands into Git credential helpers by expl | |
| 1207 | CVE-2025-56083 |
|
64.1th | 8.8 | This CVE describes an OS command injection vulnerability in Ruijie X30-PRO routers that allows attac | |
| 1208 | CVE-2025-1059 |
|
64th | 7.5 | A resource allocation vulnerability in Schneider Electric devices allows attackers to send malicious | |
| 1209 | CVE-2025-32581 |
|
64th | 7.1 | This stored cross-site scripting (XSS) vulnerability in the WordPress Spam Blocker plugin allows att | |
| 1210 | CVE-2025-64424 |
|
64th | 8.8 | A command injection vulnerability in Coolify allows low-privileged users (members) to execute arbitr | |
| 1211 | CVE-2025-21601 |
|
64th | 7.5 | An unauthenticated attacker can send specially crafted network traffic to Juniper devices to cause C | |
| 1212 | CVE-2025-64764 |
|
64th | 7.1 | A reflected cross-site scripting (XSS) vulnerability exists in Astro web framework when using server | |
| 1213 | CVE-2025-53477 |
|
64th | 7.5 | A NULL pointer dereference vulnerability in Apache NimBLE's Bluetooth stack occurs when HCI connecti | |
| 1214 | CVE-2025-21397 |
|
63.9th | 7.8 | This vulnerability allows remote code execution through specially crafted Microsoft Office documents | |
| 1215 | CVE-2025-21394 |
|
63.9th | 7.8 | This vulnerability allows remote code execution through specially crafted Excel files. Attackers cou | |
| 1216 | CVE-2025-21381 |
|
63.9th | 7.8 | Microsoft Excel contains a remote code execution vulnerability that allows attackers to execute arbi | |
| 1217 | CVE-2024-9639 |
|
63.9th | 8.0 | This vulnerability allows remote code execution if an attacker obtains session administrator credent | |
| 1218 | CVE-2025-34231 |
|
63.9th | 8.6 | This CVE describes an unauthenticated server-side request forgery (SSRF) vulnerability in Vasion Pri | |
| 1219 | CVE-2025-36072 |
|
63.9th | 8.8 | This vulnerability in IBM webMethods Integration allows authenticated users to execute arbitrary cod | |
| 1220 | CVE-2024-50631 |
|
63.9th | 7.5 | This SQL injection vulnerability in Synology Drive Server's system syncing daemon allows remote atta | |
| 1221 | CVE-2023-42970 |
|
63.9th | 8.8 | This CVE describes a use-after-free vulnerability in Apple's WebKit browser engine that could allow | |
| 1222 | CVE-2025-41714 |
|
63.9th | 8.8 | This vulnerability allows authenticated attackers to perform path traversal attacks via the 'Upload- | |
| 1223 | CVE-2025-65897 |
|
63.9th | 8.8 | This vulnerability in zdh_web allows authenticated users to upload arbitrary files to any location o | |
| 1224 | CVE-2025-30160 |
|
63.9th | 7.5 | Redlib versions before 0.36.0 contain a vulnerability where attackers can cause denial-of-service by | |
| 1225 | CVE-2026-21893 |
|
63.9th | 7.2 | A command injection vulnerability in n8n's community package installation functionality allows authe | |
| 1226 | CVE-2025-24126 |
|
63.8th | 7.3 | This CVE describes an input validation vulnerability in multiple Apple operating systems that could | |
| 1227 | CVE-2024-12805 |
|
63.8th | 7.2 | A post-authentication format string vulnerability in SonicOS management interface allows authenticat | |
| 1228 | CVE-2025-29975 |
|
63.7th | 7.8 | This vulnerability allows an authorized attacker to exploit improper link resolution in Microsoft PC | |
| 1229 | CVE-2025-34280 |
|
63.7th | 7.2 | This vulnerability allows authenticated administrators in Nagios Network Analyzer to execute arbitra | |
| 1230 | CVE-2025-10051 |
|
63.8th | 7.2 | The Demo Import Kit WordPress plugin allows authenticated attackers with Administrator privileges to | |
| 1231 | CVE-2024-48013 |
|
63.7th | 8.8 | Dell SmartFabric OS10 Software contains an execution with unnecessary privileges vulnerability that | |
| 1232 | CVE-2025-32953 |
|
63.6th | 8.7 | This vulnerability in z80pack's GitHub Actions workflow exposes the repository's GITHUB_TOKEN in pub | |
| 1233 | CVE-2025-23121 |
|
63.6th | 8.8 | This vulnerability allows authenticated domain users to execute arbitrary code on Veeam Backup Serve | |
| 1234 | CVE-2022-50792 |
|
63.6th | 7.5 | This vulnerability allows remote attackers to read arbitrary files on SOUND4 IMPACT/FIRST/PULSE/Eco | |
| 1235 | CVE-2025-30211 |
|
63.5th | 7.5 | This vulnerability in Erlang/OTP allows attackers to cause denial of service through memory exhausti | |
| 1236 | CVE-2025-2558 |
|
63.5th | 8.6 | CVE-2025-2558 is a Local File Inclusion vulnerability in The-wound WordPress theme that allows unaut | |
| 1237 | CVE-2025-21434 |
|
63.3th | 7.5 | This vulnerability allows a denial-of-service (DoS) condition in Wi-Fi systems when parsing EHT (Ext | |
| 1238 | CVE-2024-55605 |
|
63.3th | 7.5 | This vulnerability in Suricata allows attackers to cause a denial-of-service by sending specially cr | |
| 1239 | CVE-2025-68155 |
|
63.3th | 7.5 | This vulnerability in @vitejs/plugin-rsc allows unauthenticated attackers to read arbitrary files ac | |
| 1240 | CVE-2025-1361 |
|
63.2th | 7.5 | The IP2Location Country Blocker WordPress plugin exposes sensitive configuration settings to unauthe | |
| 1241 | CVE-2025-31129 |
|
63.2th | 8.8 | This vulnerability in Jooby's pac4j SessionStoreImpl module allows remote code execution through ins | |
| 1242 | CVE-2026-0796 |
|
63.2th | 8.8 | This vulnerability allows authenticated remote attackers to execute arbitrary system commands on ALG | |
| 1243 | CVE-2024-55590 |
|
63.1th | 8.8 | This vulnerability allows authenticated attackers with read-only admin permissions and CLI access to | |
| 1244 | CVE-2025-3054 |
|
63.2th | 8.8 | The WP User Frontend Pro plugin for WordPress has a vulnerability that allows authenticated attacker | |
| 1245 | CVE-2025-12824 |
|
63.1th | 8.8 | The Player Leaderboard WordPress plugin contains a Local File Inclusion vulnerability that allows au | |
| 1246 | CVE-2025-1717 |
|
63.1th | 8.1 | The Login Me Now WordPress plugin versions up to 1.7.2 contain an authentication bypass vulnerabilit | |
| 1247 | CVE-2025-4561 |
|
63.1th | 8.8 | CVE-2025-4561 is an arbitrary file upload vulnerability in KFOX from KingFor that allows authenticat | |
| 1248 | CVE-2025-6337 |
|
63.1th | 8.8 | A critical buffer overflow vulnerability in TOTOLINK A3002R and A3002RU routers allows remote attack | |
| 1249 | CVE-2025-5503 |
|
63th | 8.8 | This critical vulnerability in TOTOLINK X15 routers allows remote attackers to execute arbitrary cod | |
| 1250 | CVE-2026-22241 |
|
63.1th | 7.2 | CVE-2026-22241 is an arbitrary file upload vulnerability in Open eClass (formerly GUnet eClass) that |
What is EPSS?
The Exploit Prediction Scoring System (EPSS) is a data-driven model developed by FIRST.org that estimates the probability a CVE will be exploited in the wild within the next 30 days. Unlike CVSS which measures severity, EPSS measures likelihood of exploitation — making it ideal for prioritizing which vulnerabilities to patch first.
Why EPSS matters: With thousands of CVEs published monthly, not all vulnerabilities are equally dangerous. EPSS helps security teams focus on the CVEs most likely to be actively exploited, rather than patching solely by CVSS score. A critical CVSS 9.8 vulnerability with 0.1% EPSS may be less urgent than a high CVSS 7.5 with 90% EPSS.
Prioritize by Exploit Risk
Scan your servers and see which vulnerabilities have the highest EPSS scores. Focus on what attackers are actually targeting.
Start Monitoring Free