Most Exploitable CVEs - EPSS Rankings
CVEs ranked by EPSS (Exploit Prediction Scoring System) probability. Higher scores mean a greater likelihood of exploitation in the wild within the next 30 days.
| Rank | CVE ID | EPSS Score | Percentile | CVSS | Flags | Summary |
|---|---|---|---|---|---|---|
| 1251 | CVE-2025-13645 |
|
78.5th | 7.2 | The Modula Image Gallery WordPress plugin versions 2.13.1 to 2.13.2 contain an arbitrary file deleti | |
| 1252 | CVE-2024-9701 |
|
78.5th | 9.8 | This CVE describes a critical Remote Code Execution vulnerability in Kedro's ShelveStore class (vers | |
| 1253 | CVE-2024-13352 |
|
78.5th | 7.1 | The Legull WordPress plugin through version 1.2.2 contains a reflected cross-site scripting (XSS) vu | |
| 1254 | CVE-2025-21623 |
|
78.4th | 7.5 | This vulnerability in ClipBucket V5 allows unauthenticated attackers to perform directory traversal | |
| 1255 | CVE-2024-58275 |
|
78.4th | N/A | Easywall 0.3.1 contains an authenticated remote command execution vulnerability in the /ports-save e | |
| 1256 | CVE-2026-0786 |
|
78.4th | 8.8 | CVE-2026-0786 is a command injection vulnerability in ALGO 8180 IP Audio Alerter devices that allows | |
| 1257 | CVE-2024-39782 |
|
78.4th | 9.1 | This CVE describes multiple OS command injection vulnerabilities in the Wavlink AC3000 router's web | |
| 1258 | CVE-2024-51144 |
|
78.4th | 8.8 | This CSRF vulnerability in Ampache allows attackers to trick authenticated users into performing uni | |
| 1259 | CVE-2024-9636 |
|
78.3th | 9.8 | The Post Grid and Gutenberg Blocks WordPress plugin allows unauthenticated attackers to register as | |
| 1260 | CVE-2025-28906 |
|
78.3th | 5.9 | This stored cross-site scripting (XSS) vulnerability in the Skitter Slideshow WordPress plugin allow | |
| 1261 | CVE-2025-30293 |
|
78.3th | 6.8 | This CVE describes an Improper Input Validation vulnerability in Adobe ColdFusion that allows high-p | |
| 1262 | CVE-2025-57285 |
|
78.3th | 9.8 | CVE-2025-57285 is a critical command injection vulnerability in codeceptjs 3.7.3 that allows attacke | |
| 1263 | CVE-2024-11958 |
|
78.3th | 9.8 | A critical SQL injection vulnerability in the duckdb_retriever component of run-llama/llama_index al | |
| 1264 | CVE-2025-25759 |
|
78.3th | 7.5 | This vulnerability in SUCMS v1.0 allows attackers to perform directory traversal and delete arbitrar | |
| 1265 | CVE-2021-47728 |
|
78.3th | 9.8 | This vulnerability allows remote attackers to execute arbitrary shell commands on Selea Targa IP OCR | |
| 1266 | CVE-2025-4851 |
|
78.3th | 6.3 | This critical vulnerability in TOTOLINK N300RH routers allows remote attackers to execute arbitrary | |
| 1267 | CVE-2025-4849 |
|
78.3th | 6.3 | This critical vulnerability in TOTOLINK N300RH routers allows remote attackers to execute arbitrary | |
| 1268 | CVE-2024-24292 |
|
78.3th | 9.8 | This CVE describes a Prototype Pollution vulnerability in Aliconnect /sdk version 0.0.6 that allows | |
| 1269 | CVE-2024-7033 |
|
78.3th | 7.2 | This vulnerability allows attackers to write arbitrary files to the server's filesystem by manipulat | |
| 1270 | CVE-2025-27751 |
|
78.3th | 7.8 | A use-after-free vulnerability in Microsoft Office Excel allows attackers to execute arbitrary code | |
| 1271 | CVE-2024-57728 |
|
78.2th | 7.2 | CVE-2024-57728 is a path traversal vulnerability in SimpleHelp remote support software that allows a | |
| 1272 | CVE-2024-49375 |
|
78.2th | 9.0 | CVE-2024-49375 is a critical remote code execution vulnerability in Rasa, an open-source machine lea | |
| 1273 | CVE-2025-1044 |
|
78.2th | 9.8 | This critical authentication bypass vulnerability allows remote attackers to completely bypass authe | |
| 1274 | CVE-2021-47693 |
|
78.2th | 8.8 | This SQL injection vulnerability in Nagios XI's Core Config Manager allows authenticated users to in | |
| 1275 | CVE-2020-36859 |
|
78.2th | 8.8 | This SQL injection vulnerability in Nagios XI's Core Config Manager allows authenticated users to in | |
| 1276 | CVE-2016-15050 |
|
78.2th | 8.8 | Nagios XI versions before 5.2.4 contain a SQL injection vulnerability in the notification search fea | |
| 1277 | CVE-2012-10063 |
|
78.2th | 9.8 | This SQL injection vulnerability in Nagios XI's legacy Core Configuration Manager allows authenticat | |
| 1278 | CVE-2025-60962 |
|
78.2th | 8.2 | This CVE describes an OS command injection vulnerability in EndRun Technologies Sonoma D12 Network T | |
| 1279 | CVE-2025-60959 |
|
78.2th | 8.2 | This CVE describes an OS command injection vulnerability in EndRun Technologies Sonoma D12 Network T | |
| 1280 | CVE-2025-7441 |
|
78.2th | 9.8 | The StoryChief WordPress plugin has an unauthenticated arbitrary file upload vulnerability in its RE | |
| 1281 | CVE-2025-14155 |
|
78.2th | 5.3 | This vulnerability allows unauthenticated attackers to view private, draft, and pending Elementor te | |
| 1282 | CVE-2024-13094 |
|
78.1th | 7.1 | This vulnerability allows attackers to inject malicious scripts into WordPress admin pages via unsan | |
| 1283 | CVE-2024-13815 |
|
78.1th | 6.5 | The Listingo WordPress theme allows unauthenticated attackers to execute arbitrary shortcodes due to | |
| 1284 | CVE-2025-58429 |
|
78.1th | 7.5 | An unauthenticated remote attacker can exploit a relative path traversal vulnerability in Productivi | |
| 1285 | CVE-2024-8958 |
|
78.1th | 9.8 | This vulnerability allows attackers to read and write arbitrary files on servers running composiohq/ | |
| 1286 | CVE-2025-59834 |
|
78.1th | 9.8 | CVE-2025-59834 is a command injection vulnerability in ADB MCP Server versions 0.1.0 and earlier tha | |
| 1287 | CVE-2025-6439 |
|
78.1th | 9.8 | This vulnerability allows unauthenticated attackers to delete arbitrary files on WordPress servers r | |
| 1288 | CVE-2025-7526 |
|
78.1th | 9.8 | This vulnerability allows unauthenticated attackers to delete arbitrary files on WordPress servers r | |
| 1289 | CVE-2025-10090 |
|
78.1th | 7.3 | This CVE describes a SQL injection vulnerability in Jinher OA software up to version 1.2, specifical | |
| 1290 | CVE-2025-1771 |
|
78th | 9.8 | This vulnerability in the Traveler WordPress theme allows unauthenticated attackers to include and e | |
| 1291 | CVE-2025-3328 |
|
78th | 8.8 | A critical buffer overflow vulnerability in Tenda AC1206 routers allows remote attackers to execute | |
| 1292 | CVE-2025-27737 |
|
78th | 8.6 | This vulnerability allows a local attacker to bypass Windows Security Zone Mapping through improper | |
| 1293 | CVE-2023-37032 |
|
78th | 7.5 | A stack-based buffer overflow vulnerability in Magma's Mobile Management Entity (MME) allows remote | |
| 1294 | CVE-2025-24962 |
|
78th | 8.8 | CVE-2025-24962 is a command injection vulnerability in reNgine's nmap_cmd parameter that allows auth | |
| 1295 | CVE-2025-29386 |
|
78th | 9.8 | This vulnerability allows remote attackers to execute arbitrary code on Tenda AC9 routers by exploit | |
| 1296 | CVE-2022-2421 |
|
78th | 10.0 | CVE-2022-2421 is a critical vulnerability in the Socket.io JavaScript library that allows attackers | |
| 1297 | CVE-2025-4350 |
|
78th | 8.8 | A critical command injection vulnerability in D-Link DIR-600L routers allows remote attackers to exe | |
| 1298 | CVE-2025-32434 |
|
77.9th | 9.8 | A critical Remote Command Execution vulnerability exists in PyTorch when loading models with torch.l | |
| 1299 | CVE-2025-0818 |
|
77.9th | 6.5 | This CVE describes a directory traversal vulnerability in elFinder versions 2.1.64 and prior when us | |
| 1300 | CVE-2025-7696 |
|
77.9th | 9.8 | This vulnerability allows unauthenticated attackers to perform PHP object injection through the Inte |
What is EPSS?
The Exploit Prediction Scoring System (EPSS) is a data-driven model developed by FIRST.org that estimates the probability a CVE will be exploited in the wild within the next 30 days. Unlike CVSS which measures severity, EPSS measures likelihood of exploitation — making it ideal for prioritizing which vulnerabilities to patch first.
Why EPSS matters: With thousands of CVEs published monthly, not all vulnerabilities are equally dangerous. EPSS helps security teams focus on the CVEs most likely to be actively exploited, rather than patching solely by CVSS score. A critical CVSS 9.8 vulnerability with 0.1% EPSS may be less urgent than a high CVSS 7.5 with 90% EPSS.
Prioritize by Exploit Risk
Scan your servers and see which vulnerabilities have the highest EPSS scores. Focus on what attackers are actually targeting.
Start Monitoring Free