Most Exploitable CVEs - EPSS Rankings
CVEs ranked by EPSS (Exploit Prediction Scoring System) probability. Higher scores mean a greater likelihood of exploitation in the wild within the next 30 days.
| Rank | CVE ID | EPSS Score | Percentile | CVSS | Flags | Summary |
|---|---|---|---|---|---|---|
| 1401 | CVE-2025-1310 |
|
76.8th | 6.5 | The Jobs for WordPress plugin contains a directory traversal vulnerability that allows authenticated | |
| 1402 | CVE-2025-47855 |
|
76.7th | 9.8 | An unauthenticated attacker can obtain device configuration files from vulnerable FortiFone systems | |
| 1403 | CVE-2025-7524 |
|
76.7th | 6.3 | This critical vulnerability in TOTOLINK T6 routers allows remote attackers to execute arbitrary comm | |
| 1404 | CVE-2025-30012 |
|
76.7th | 10.0 | This vulnerability allows unauthenticated attackers to execute arbitrary operating system commands a | |
| 1405 | CVE-2025-2855 |
|
76.7th | 4.7 | A deserialization vulnerability in elunez eladmin's file upload function allows remote attackers to | |
| 1406 | CVE-2025-26639 |
|
76.7th | 7.8 | An integer overflow vulnerability in the Windows USB Print Driver allows authenticated attackers to | |
| 1407 | CVE-2025-61304 |
|
76.7th | 9.8 | This CVE describes an OS command injection vulnerability in Dynatrace ActiveGate's ping extension. A | |
| 1408 | CVE-2025-41244 |
|
76.7th | 7.8 | KEV | This CVE describes a local privilege escalation vulnerability in VMware Aria Operations and VMware T |
| 1409 | CVE-2025-31672 |
|
76.6th | 5.3 | This vulnerability allows attackers to create malicious OOXML files (like Excel, Word, or PowerPoint | |
| 1410 | CVE-2025-1009 |
|
76.6th | 9.8 | A use-after-free vulnerability in Firefox and Thunderbird allows attackers to cause potentially expl | |
| 1411 | CVE-2025-7097 |
|
76.6th | 8.1 | This critical vulnerability in Comodo Internet Security Premium allows remote attackers to execute a | |
| 1412 | CVE-2025-1282 |
|
76.6th | 8.8 | This vulnerability in the Car Dealer Automotive WordPress theme allows authenticated attackers with | |
| 1413 | CVE-2025-21628 |
|
76.6th | 9.1 | This SQL injection vulnerability in Chatwoot allows authenticated users to execute arbitrary SQL que | |
| 1414 | CVE-2025-32973 |
|
76.6th | 9.0 | This vulnerability in XWiki allows attackers to gain programming rights through a privilege escalati | |
| 1415 | CVE-2025-24074 |
|
76.6th | 7.8 | This vulnerability allows an authorized attacker with local access to a Windows system to elevate pr | |
| 1416 | CVE-2025-24062 |
|
76.6th | 7.8 | CVE-2025-24062 is a local privilege escalation vulnerability in Windows Desktop Window Manager (DWM) | |
| 1417 | CVE-2025-24058 |
|
76.6th | 7.8 | This vulnerability allows an authorized attacker with existing access to a Windows system to exploit | |
| 1418 | CVE-2025-21325 |
|
76.6th | 7.8 | This vulnerability allows an authenticated attacker to execute arbitrary code with kernel privileges | |
| 1419 | CVE-2025-24888 |
|
76.5th | 8.1 | This vulnerability allows a compromised SecureDrop Server to execute arbitrary code on the SecureDro | |
| 1420 | CVE-2023-6786 |
|
76.5th | 6.1 | The Payment Gateway for Telcell WordPress plugin through version 2.0.1 contains an open redirect vul | |
| 1421 | CVE-2025-29522 |
|
76.5th | 6.5 | This CVE describes a command injection vulnerability in D-Link DSL-7740C routers that allows authent | |
| 1422 | CVE-2024-57669 |
|
76.5th | 7.5 | A directory traversal vulnerability in Zrlog backup-sql-file.jar v3.0.31 allows remote attackers to | |
| 1423 | CVE-2024-12749 |
|
76.5th | 7.1 | This vulnerability in the Competition Form WordPress plugin allows attackers to inject malicious scr | |
| 1424 | CVE-2025-30471 |
|
76.5th | 7.5 | A validation logic vulnerability in multiple Apple operating systems allows remote attackers to caus | |
| 1425 | CVE-2024-12638 |
|
76.5th | 7.1 | This vulnerability in the Bulk Me Now! WordPress plugin allows attackers to inject malicious scripts | |
| 1426 | CVE-2025-48732 |
|
76.5th | 7.3 | An incomplete blacklist in WWBN AVideo's .htaccess sample allows attackers to execute arbitrary code | |
| 1427 | CVE-2024-14003 |
|
76.5th | 9.8 | Nagios XI versions before 2024R1.2 contain a critical remote code execution vulnerability in the NRD | |
| 1428 | CVE-2024-11369 |
|
76.4th | 6.1 | This vulnerability allows unauthenticated attackers to perform reflected cross-site scripting (XSS) | |
| 1429 | CVE-2025-20124 |
|
76.4th | 9.9 | This vulnerability allows authenticated attackers with read-only admin credentials to execute arbitr | |
| 1430 | CVE-2025-6389 |
|
76.4th | 9.8 | The Sneeit Framework WordPress plugin has a critical Remote Code Execution vulnerability that allows | |
| 1431 | CVE-2025-25745 |
|
76.4th | 8.8 | This vulnerability allows remote attackers to execute arbitrary code on D-Link DIR-853 A1 routers by | |
| 1432 | CVE-2025-20363 |
|
76.4th | 9.0 | This critical vulnerability allows remote attackers to execute arbitrary code with root privileges o | |
| 1433 | CVE-2025-3434 |
|
76.4th | 7.2 | The SMTP for Amazon SES – YaySMTP WordPress plugin has a stored cross-site scripting vulnerability | |
| 1434 | CVE-2025-14500 |
|
76.4th | 9.8 | This vulnerability allows unauthenticated remote attackers to execute arbitrary operating system com | |
| 1435 | CVE-2024-13831 |
|
76.3th | 7.2 | The Tabs for WooCommerce WordPress plugin is vulnerable to PHP object injection through deserializat | |
| 1436 | CVE-2024-9664 |
|
76.3th | 7.2 | The WP All Import Pro plugin for WordPress is vulnerable to PHP object injection through deserializa | |
| 1437 | CVE-2025-1785 |
|
76.3th | 5.4 | The Download Manager plugin for WordPress has a directory traversal vulnerability that allows authen | |
| 1438 | CVE-2024-13833 |
|
76.3th | 7.2 | This vulnerability in the Album Gallery WordPress plugin allows authenticated attackers with Editor- | |
| 1439 | CVE-2025-61811 |
|
76.3th | 9.1 | This CVE describes an Improper Access Control vulnerability in Adobe ColdFusion that allows high-pri | |
| 1440 | CVE-2024-32641 |
|
76.4th | 9.8 | CVE-2024-32641 is a critical remote code execution vulnerability in Masa CMS that allows unauthentic | |
| 1441 | CVE-2024-8019 |
|
76.3th | 9.1 | This vulnerability in PyTorch Lightning's LightningApp allows attackers to write arbitrary files via | |
| 1442 | CVE-2025-28399 |
|
76.3th | 9.8 | A privilege escalation vulnerability in Erick xmall v1.1 and earlier allows remote attackers to gain | |
| 1443 | CVE-2025-28412 |
|
76.3th | 9.8 | A privilege escalation vulnerability in RUoYi v.4.8.0 allows remote attackers to gain elevated privi | |
| 1444 | CVE-2025-28410 |
|
76.3th | 9.8 | A privilege escalation vulnerability in RUoYi v.4.8.0 allows remote attackers to gain administrative | |
| 1445 | CVE-2025-28408 |
|
76.3th | 9.8 | A privilege escalation vulnerability in RUoYi v.4.8.0 allows remote attackers to gain elevated privi | |
| 1446 | CVE-2025-28405 |
|
76.3th | 9.8 | A privilege escalation vulnerability in RUoYi v.4.8.0 allows remote attackers to gain elevated privi | |
| 1447 | CVE-2025-28402 |
|
76.3th | 9.8 | A privilege escalation vulnerability in RUoYi v.4.8.0 allows remote attackers to gain elevated privi | |
| 1448 | CVE-2024-57212 |
|
76.3th | 5.1 | This CVE describes a command injection vulnerability in TOTOLINK A6000R routers that allows attacker | |
| 1449 | CVE-2024-13790 |
|
76.3th | 9.8 | This vulnerability allows unauthenticated attackers to perform Local File Inclusion (LFI) in the Min | |
| 1450 | CVE-2024-13727 |
|
76.3th | 6.1 | This vulnerability in the MemberSpace WordPress plugin allows attackers to inject malicious scripts |
What is EPSS?
The Exploit Prediction Scoring System (EPSS) is a data-driven model developed by FIRST.org that estimates the probability a CVE will be exploited in the wild within the next 30 days. Unlike CVSS which measures severity, EPSS measures likelihood of exploitation — making it ideal for prioritizing which vulnerabilities to patch first.
Why EPSS matters: With thousands of CVEs published monthly, not all vulnerabilities are equally dangerous. EPSS helps security teams focus on the CVEs most likely to be actively exploited, rather than patching solely by CVSS score. A critical CVSS 9.8 vulnerability with 0.1% EPSS may be less urgent than a high CVSS 7.5 with 90% EPSS.
Prioritize by Exploit Risk
Scan your servers and see which vulnerabilities have the highest EPSS scores. Focus on what attackers are actually targeting.
Start Monitoring Free