Most Exploitable CVEs - EPSS Rankings
CVEs ranked by EPSS (Exploit Prediction Scoring System) probability. Higher scores mean a greater likelihood of exploitation in the wild within the next 30 days.
| Rank | CVE ID | EPSS Score | Percentile | CVSS | Flags | Summary |
|---|---|---|---|---|---|---|
| 1201 | CVE-2025-31791 |
|
44.2th | 5.4 | This CVE describes a missing authorization vulnerability in the Pin Generator WordPress plugin that | |
| 1202 | CVE-2025-31782 |
|
44.2th | 5.4 | This CVE describes a missing authorization vulnerability in the mb.YTPlayer WordPress plugin that al | |
| 1203 | CVE-2025-30009 |
|
44.1th | 6.1 | This vulnerability in SAP SRM's Live Auction Cockpit allows unauthenticated attackers to execute mal | |
| 1204 | CVE-2025-55679 |
|
44th | 5.1 | This Windows Kernel vulnerability allows local attackers to read sensitive kernel memory due to impr | |
| 1205 | CVE-2024-11628 |
|
44th | 4.1 | This CVE describes a prototype pollution vulnerability in Progress Telerik Kendo UI for Vue componen | |
| 1206 | CVE-2024-58128 |
|
44th | 5.5 | This vulnerability allows attackers with admin privileges in MISP to inject malicious scripts via me | |
| 1207 | CVE-2025-2847 |
|
44th | 6.3 | A critical SQL injection vulnerability exists in Codezips Gym Management System 1.0 through the /das | |
| 1208 | CVE-2025-32782 |
|
43.9th | 5.3 | Ash Authentication's account confirmation flow uses GET requests triggered by email links. Email cli | |
| 1209 | CVE-2025-3559 |
|
44th | 6.3 | This critical SQL injection vulnerability in ghostxbh uzy-ssm-mall 1.0.0 allows remote attackers to | |
| 1210 | CVE-2025-3553 |
|
44th | 6.3 | This critical SQL injection vulnerability in phpshe 1.8 allows remote attackers to execute arbitrary | |
| 1211 | CVE-2025-3305 |
|
43.9th | 4.3 | CVE-2025-3305 is an improper access control vulnerability in IKUN_Library 1.0 that allows remote att | |
| 1212 | CVE-2025-9710 |
|
43.9th | 6.3 | This vulnerability in the Responsive Lightbox & Gallery WordPress plugin allows unauthenticated atta | |
| 1213 | CVE-2024-35278 |
|
43.8th | 4.3 | This SQL injection vulnerability in Fortinet FortiPortal allows authenticated attackers to view serv | |
| 1214 | CVE-2025-23037 |
|
43.8th | 5.4 | A stored cross-site scripting (XSS) vulnerability in WeGIA's control.php endpoint allows attackers t | |
| 1215 | CVE-2025-23035 |
|
43.8th | 5.4 | A stored cross-site scripting (XSS) vulnerability in WeGIA's adicionar_tipo_quadro_horario.php endpo | |
| 1216 | CVE-2025-23033 |
|
43.8th | 5.4 | This stored XSS vulnerability in WeGIA allows attackers to inject malicious scripts through the 'sit | |
| 1217 | CVE-2025-23031 |
|
43.8th | 5.4 | A stored cross-site scripting (XSS) vulnerability in WeGIA's adicionar_alergia.php endpoint allows a | |
| 1218 | CVE-2025-22613 |
|
43.8th | 5.4 | This stored XSS vulnerability in WeGIA allows attackers to inject malicious scripts into the 'descri | |
| 1219 | CVE-2025-22142 |
|
43.8th | 5.4 | This is a stored cross-site scripting (XSS) vulnerability in NamelessMC where administrators can add | |
| 1220 | CVE-2024-13109 |
|
43.9th | 5.3 | This vulnerability allows unauthorized access to the /doc.html endpoint in Beijing Yunfan Internet T | |
| 1221 | CVE-2025-27609 |
|
43.8th | 5.4 | CVE-2025-27609 is a cross-site scripting (XSS) vulnerability in Icinga Web 2 that allows attackers t | |
| 1222 | CVE-2025-29782 |
|
43.8th | 5.4 | A stored XSS vulnerability in WeGIA's 'adicionar_tipo_docs_atendido.php' endpoint allows attackers t | |
| 1223 | CVE-2025-25191 |
|
43.8th | 5.4 | This stored cross-site scripting (XSS) vulnerability in Group-Office allows attackers to inject mali | |
| 1224 | CVE-2025-33026 |
|
43.9th | 6.1 | This vulnerability allows attackers to bypass Windows' Mark-of-the-Web protection in PeaZip when ext | |
| 1225 | CVE-2025-6097 |
|
43.9th | 5.3 | This vulnerability allows remote attackers to change the administrator password without verification | |
| 1226 | CVE-2025-25289 |
|
43.8th | 5.3 | A Regular Expression Denial of Service (ReDoS) vulnerability exists in @octokit/request-error versio | |
| 1227 | CVE-2025-7566 |
|
43.7th | 4.7 | This critical vulnerability in jshERP allows remote attackers to perform path traversal attacks via | |
| 1228 | CVE-2025-8804 |
|
43.8th | 5.3 | This vulnerability in Open5GS AMF component allows remote attackers to trigger a reachable assertion | |
| 1229 | CVE-2025-42919 |
|
43.7th | 5.3 | CVE-2025-42919 is an information disclosure vulnerability in SAP NetWeaver Application Server Java t | |
| 1230 | CVE-2025-67636 |
|
43.8th | 4.3 | This vulnerability in Jenkins allows attackers with View/Read permission to view encrypted password | |
| 1231 | CVE-2025-24803 |
|
43.7th | 5.4 | CVE-2025-24803 is a stored cross-site scripting (XSS) vulnerability in Mobile Security Framework (Mo | |
| 1232 | CVE-2025-27412 |
|
43.6th | 6.1 | CVE-2025-27412 is a reflected cross-site scripting (XSS) vulnerability in REDAXO CMS that allows att | |
| 1233 | CVE-2025-3453 |
|
43.6th | 5.3 | This vulnerability in the Password Protected WordPress plugin allows unauthenticated attackers to ex | |
| 1234 | CVE-2025-31476 |
|
43.6th | 4.8 | A cross-site scripting (XSS) vulnerability in tarteaucitron.js allows privileged users to inject mal | |
| 1235 | CVE-2025-2786 |
|
43.7th | 4.3 | This vulnerability in Tempo Operator allows users with full namespace access to extract ServiceAccou | |
| 1236 | CVE-2024-13780 |
|
43.6th | 6.5 | The Hero Mega Menu WordPress plugin has an arbitrary file deletion vulnerability that allows unauthe | |
| 1237 | CVE-2025-3737 |
|
43.5th | 5.9 | This vulnerability in the Drupal Google Maps: Store Locator module allows attackers to execute arbit | |
| 1238 | CVE-2025-3735 |
|
43.5th | 5.9 | This vulnerability affects the obsolete Drupal Panelizer module, allowing attackers to exploit unspe | |
| 1239 | CVE-2019-25223 |
|
43.5th | 4.9 | This SQL injection vulnerability in the Team Circle Image Slider With Lightbox WordPress plugin allo | |
| 1240 | CVE-2025-10146 |
|
43.5th | 6.1 | The Download Manager WordPress plugin up to version 3.3.23 contains a reflected cross-site scripting | |
| 1241 | CVE-2024-51741 |
|
43.4th | 4.4 | An authenticated attacker with sufficient privileges can create a malformed ACL selector in Redis th | |
| 1242 | CVE-2024-13722 |
|
43.4th | 5.4 | The NagVis component in Checkmk is vulnerable to reflected cross-site scripting (XSS), allowing atta | |
| 1243 | CVE-2025-3697 |
|
43.4th | 6.3 | This critical SQL injection vulnerability in SourceCodester Web-based Pharmacy Product Management Sy | |
| 1244 | CVE-2025-3397 |
|
43.5th | 4.3 | This vulnerability allows attackers to inject malicious scripts via the 'gourl' parameter in YzmCMS | |
| 1245 | CVE-2025-1264 |
|
43.4th | 6.5 | This SQL injection vulnerability in the Broken Link Checker WordPress plugin allows authenticated at | |
| 1246 | CVE-2025-21329 |
|
43.2th | 4.3 | This vulnerability allows attackers to bypass security zone restrictions in Windows when processing | |
| 1247 | CVE-2022-43847 |
|
43.2th | 5.4 | IBM Aspera Console versions 3.4.0 through 3.4.4 are vulnerable to HTTP header injection due to impro | |
| 1248 | CVE-2024-13106 |
|
43.1th | 5.3 | This vulnerability in D-Link DIR-816 routers allows unauthorized access to the IP QoS configuration | |
| 1249 | CVE-2023-46606 |
|
43.1th | 5.3 | This CVE describes a missing authorization vulnerability in the AtomChat WordPress plugin that allow | |
| 1250 | CVE-2024-13719 |
|
43.1th | 5.3 | The PeproDev Ultimate Invoice WordPress plugin has an Insecure Direct Object Reference vulnerability |
What is EPSS?
The Exploit Prediction Scoring System (EPSS) is a data-driven model developed by FIRST.org that estimates the probability a CVE will be exploited in the wild within the next 30 days. Unlike CVSS which measures severity, EPSS measures likelihood of exploitation — making it ideal for prioritizing which vulnerabilities to patch first.
Why EPSS matters: With thousands of CVEs published monthly, not all vulnerabilities are equally dangerous. EPSS helps security teams focus on the CVEs most likely to be actively exploited, rather than patching solely by CVSS score. A critical CVSS 9.8 vulnerability with 0.1% EPSS may be less urgent than a high CVSS 7.5 with 90% EPSS.
Prioritize by Exploit Risk
Scan your servers and see which vulnerabilities have the highest EPSS scores. Focus on what attackers are actually targeting.
Start Monitoring Free