Most Exploitable CVEs - EPSS Rankings
CVEs ranked by EPSS (Exploit Prediction Scoring System) probability. Higher scores mean a greater likelihood of exploitation in the wild within the next 30 days.
| Rank | CVE ID | EPSS Score | Percentile | CVSS | Flags | Summary |
|---|---|---|---|---|---|---|
| 1401 | CVE-2024-2356 |
|
47.2th | 9.6 | This CVE describes a Local File Inclusion vulnerability in the lollms-webui application that allows | |
| 1402 | CVE-2025-6087 |
|
47.2th | 9.1 | A Server-Side Request Forgery (SSRF) vulnerability in the @opennextjs/cloudflare package allows unau | |
| 1403 | CVE-2025-37095 |
|
47.2th | 9.8 | A directory traversal vulnerability in HPE StoreOnce Software allows attackers to access sensitive f | |
| 1404 | CVE-2025-6507 |
|
47.1th | 9.8 | This vulnerability in h2o-3 allows attackers to bypass regex filters in JDBC connections by manipula | |
| 1405 | CVE-2025-10611 |
|
47.2th | 9.8 | This critical vulnerability in WSO2 products allows attackers to bypass authentication and authoriza | |
| 1406 | CVE-2025-11783 |
|
47.1th | 9.8 | A stack-based buffer overflow vulnerability in Circutor SGE-PLC1000/SGE-PLC50 v9.0.2 allows remote a | |
| 1407 | CVE-2025-69971 |
|
47.2th | 9.8 | FUXA v1.2.7 contains a hard-coded JWT secret key that allows attackers to forge valid authentication | |
| 1408 | CVE-2025-0767 |
|
47.1th | 9.8 | CVE-2025-0767 is a PHP object injection vulnerability in WP Activity Log plugin that allows remote c | |
| 1409 | CVE-2025-28009 |
|
47.1th | 9.8 | A SQL injection vulnerability in Dietiqa App v1.0.20 allows attackers to execute arbitrary SQL comma | |
| 1410 | CVE-2025-32626 |
|
47.1th | 9.3 | This SQL injection vulnerability in JoomSky JS Job Manager allows attackers to execute arbitrary SQL | |
| 1411 | CVE-2025-22930 |
|
47.1th | 9.8 | This SQL injection vulnerability in OS4ED openSIS allows attackers to execute arbitrary SQL commands | |
| 1412 | CVE-2025-30886 |
|
47.1th | 9.3 | This SQL injection vulnerability in JoomSky JS Help Desk allows attackers to execute arbitrary SQL c | |
| 1413 | CVE-2025-7624 |
|
47th | 9.8 | An SQL injection vulnerability in Sophos Firewall's legacy SMTP proxy allows remote attackers to exe | |
| 1414 | CVE-2025-45479 |
|
47.1th | 9.8 | This vulnerability allows attackers to execute arbitrary code on educoder challenge containers by in | |
| 1415 | CVE-2025-3626 |
|
47.1th | 9.1 | This critical vulnerability allows remote attackers with administrator credentials to execute arbitr | |
| 1416 | CVE-2024-53544 |
|
47th | 9.8 | This SQL injection vulnerability in NovaCHRON Smart Time Plus allows attackers to execute arbitrary | |
| 1417 | CVE-2025-26936 |
|
46.8th | 10.0 | This critical vulnerability in the Fresh Framework WordPress plugin allows unauthenticated attackers | |
| 1418 | CVE-2025-26970 |
|
46.8th | 10.0 | This critical vulnerability allows unauthenticated attackers to execute arbitrary code on WordPress | |
| 1419 | CVE-2025-40549 |
|
47th | 9.1 | A path restriction bypass vulnerability in SolarWinds Serv-U allows administrators to execute code o | |
| 1420 | CVE-2025-27672 |
|
46.7th | 9.8 | This vulnerability allows attackers to bypass OAuth authentication in Vasion Print (formerly Printer | |
| 1421 | CVE-2025-58371 |
|
46.7th | 9.8 | CVE-2025-58371 is a critical vulnerability in Roo Code versions 3.26.6 and below that allows remote | |
| 1422 | CVE-2026-22792 |
|
46.7th | 9.6 | This vulnerability allows attackers to inject malicious HTML that executes arbitrary JavaScript in t | |
| 1423 | CVE-2024-4990 |
|
46.6th | 9.1 | This vulnerability in Yii2's Component class allows attackers to instantiate arbitrary classes and c | |
| 1424 | CVE-2024-53298 |
|
46.6th | 9.8 | Dell PowerScale OneFS versions 9.5.0.0 through 9.10.0.1 have a critical missing authorization vulner | |
| 1425 | CVE-2025-36594 |
|
46.6th | 9.8 | An authentication bypass vulnerability in Dell PowerProtect Data Domain allows unauthenticated remot | |
| 1426 | CVE-2025-4578 |
|
46.5th | 9.8 | This vulnerability allows unauthenticated attackers to execute arbitrary SQL commands on WordPress s | |
| 1427 | CVE-2025-8861 |
|
46.5th | 9.8 | CVE-2025-8861 is a critical Missing Authentication vulnerability in TSA software developed by Changi | |
| 1428 | CVE-2022-50589 |
|
46.5th | 9.8 | This is a critical SQL injection vulnerability in SuiteCRM's export functionality that allows unauth | |
| 1429 | CVE-2025-23953 |
|
46.2th | 10.0 | This vulnerability allows attackers to upload arbitrary files, including web shells, to web servers | |
| 1430 | CVE-2024-57579 |
|
46.2th | 9.8 | This CVE describes a stack overflow vulnerability in Tenda AC18 routers that allows remote code exec | |
| 1431 | CVE-2024-29970 |
|
46.2th | 9.8 | Fortanix Enclave OS has an interface vulnerability that allows attackers to inject signals, leading | |
| 1432 | CVE-2024-13285 |
|
46.2th | 9.8 | This vulnerability in Drupal's wkhtmltopdf module allows remote code execution through improper inpu | |
| 1433 | CVE-2025-22504 |
|
46.2th | 10.0 | This vulnerability allows attackers to upload arbitrary files, including web shells, to servers runn | |
| 1434 | CVE-2025-26615 |
|
46.2th | 10.0 | A path traversal vulnerability in WeGIA's examples.php endpoint allows attackers to read the config. | |
| 1435 | CVE-2024-36554 |
|
46.2th | 9.8 | This vulnerability in Forever KidsWatch smartwatches allows attackers to remotely extract sensitive | |
| 1436 | CVE-2025-6380 |
|
46.2th | 9.8 | This vulnerability in the ONLYOFFICE Docs WordPress plugin allows unauthenticated attackers to escal | |
| 1437 | CVE-2024-57077 |
|
46.2th | 9.1 | CVE-2024-57077 is a prototype pollution vulnerability in utils-extend library version 1.0.8 that all | |
| 1438 | CVE-2025-2605 |
|
46th | 9.9 | This OS command injection vulnerability in Honeywell MB-Secure allows attackers to execute arbitrary | |
| 1439 | CVE-2023-37936 |
|
46th | 9.8 | This vulnerability allows attackers to execute arbitrary code or commands on affected FortiSwitch de | |
| 1440 | CVE-2023-25574 |
|
45.9th | 10.0 | CVE-2023-25574 is a critical authentication bypass vulnerability in jupyterhub-ltiauthenticator's LT | |
| 1441 | CVE-2025-24894 |
|
45.9th | 9.1 | This vulnerability in SPID.AspNetCore.Authentication allows attackers to bypass SAML signature valid | |
| 1442 | CVE-2025-6121 |
|
45.9th | 9.8 | A critical stack-based buffer overflow vulnerability in D-Link DIR-632 routers allows remote attacke | |
| 1443 | CVE-2025-53970 |
|
46th | 9.8 | This critical vulnerability in SS1 Ver.16.0.0.10 and earlier allows remote unauthenticated attackers | |
| 1444 | CVE-2025-68109 |
|
45.9th | 9.1 | ChurchCRM versions before 6.5.3 have a critical vulnerability in the Database Restore functionality | |
| 1445 | CVE-2025-24677 |
|
45.9th | 9.9 | This vulnerability allows remote attackers to execute arbitrary code on WordPress sites running the | |
| 1446 | CVE-2025-55575 |
|
45.8th | 9.8 | CVE-2025-55575 is a critical SQL injection vulnerability in SMM Panel 3.1 that allows remote attacke | |
| 1447 | CVE-2025-56333 |
|
45.9th | 9.8 | A critical authentication bypass vulnerability in Fossorial Pangolin's 2FA component allows remote a | |
| 1448 | CVE-2025-22523 |
|
45.8th | 9.3 | This SQL injection vulnerability in the NotFound Schedule WordPress plugin allows attackers to execu | |
| 1449 | CVE-2025-26898 |
|
45.8th | 9.3 | This SQL injection vulnerability in the Shinetheme Traveler WordPress theme allows attackers to exec | |
| 1450 | CVE-2025-39471 |
|
45.8th | 9.3 | This SQL injection vulnerability in the Pantherius Modal Survey WordPress plugin allows attackers to |
What is EPSS?
The Exploit Prediction Scoring System (EPSS) is a data-driven model developed by FIRST.org that estimates the probability a CVE will be exploited in the wild within the next 30 days. Unlike CVSS which measures severity, EPSS measures likelihood of exploitation — making it ideal for prioritizing which vulnerabilities to patch first.
Why EPSS matters: With thousands of CVEs published monthly, not all vulnerabilities are equally dangerous. EPSS helps security teams focus on the CVEs most likely to be actively exploited, rather than patching solely by CVSS score. A critical CVSS 9.8 vulnerability with 0.1% EPSS may be less urgent than a high CVSS 7.5 with 90% EPSS.
Prioritize by Exploit Risk
Scan your servers and see which vulnerabilities have the highest EPSS scores. Focus on what attackers are actually targeting.
Start Monitoring Free