Most Exploitable CVEs - EPSS Rankings

CVEs ranked by EPSS (Exploit Prediction Scoring System) probability. Higher scores mean a greater likelihood of exploitation in the wild within the next 30 days.

164
EPSS > 50%
156
CISA KEV Listed
35,468
CVEs with EPSS
0.7%
Avg EPSS Score
All Critical High Medium Low
Rank CVE ID EPSS Score Percentile CVSS Flags Summary
1401 CVE-2024-2356
0.24%
47.2th 9.6 This CVE describes a Local File Inclusion vulnerability in the lollms-webui application that allows
1402 CVE-2025-6087
0.24%
47.2th 9.1 A Server-Side Request Forgery (SSRF) vulnerability in the @opennextjs/cloudflare package allows unau
1403 CVE-2025-37095
0.24%
47.2th 9.8 A directory traversal vulnerability in HPE StoreOnce Software allows attackers to access sensitive f
1404 CVE-2025-6507
0.24%
47.1th 9.8 This vulnerability in h2o-3 allows attackers to bypass regex filters in JDBC connections by manipula
1405 CVE-2025-10611
0.24%
47.2th 9.8 This critical vulnerability in WSO2 products allows attackers to bypass authentication and authoriza
1406 CVE-2025-11783
0.24%
47.1th 9.8 A stack-based buffer overflow vulnerability in Circutor SGE-PLC1000/SGE-PLC50 v9.0.2 allows remote a
1407 CVE-2025-69971
0.24%
47.2th 9.8 FUXA v1.2.7 contains a hard-coded JWT secret key that allows attackers to forge valid authentication
1408 CVE-2025-0767
0.24%
47.1th 9.8 CVE-2025-0767 is a PHP object injection vulnerability in WP Activity Log plugin that allows remote c
1409 CVE-2025-28009
0.24%
47.1th 9.8 A SQL injection vulnerability in Dietiqa App v1.0.20 allows attackers to execute arbitrary SQL comma
1410 CVE-2025-32626
0.24%
47.1th 9.3 This SQL injection vulnerability in JoomSky JS Job Manager allows attackers to execute arbitrary SQL
1411 CVE-2025-22930
0.24%
47.1th 9.8 This SQL injection vulnerability in OS4ED openSIS allows attackers to execute arbitrary SQL commands
1412 CVE-2025-30886
0.24%
47.1th 9.3 This SQL injection vulnerability in JoomSky JS Help Desk allows attackers to execute arbitrary SQL c
1413 CVE-2025-7624
0.24%
47th 9.8 An SQL injection vulnerability in Sophos Firewall's legacy SMTP proxy allows remote attackers to exe
1414 CVE-2025-45479
0.24%
47.1th 9.8 This vulnerability allows attackers to execute arbitrary code on educoder challenge containers by in
1415 CVE-2025-3626
0.24%
47.1th 9.1 This critical vulnerability allows remote attackers with administrator credentials to execute arbitr
1416 CVE-2024-53544
0.24%
47th 9.8 This SQL injection vulnerability in NovaCHRON Smart Time Plus allows attackers to execute arbitrary
1417 CVE-2025-26936
0.24%
46.8th 10.0 This critical vulnerability in the Fresh Framework WordPress plugin allows unauthenticated attackers
1418 CVE-2025-26970
0.24%
46.8th 10.0 This critical vulnerability allows unauthenticated attackers to execute arbitrary code on WordPress
1419 CVE-2025-40549
0.24%
47th 9.1 A path restriction bypass vulnerability in SolarWinds Serv-U allows administrators to execute code o
1420 CVE-2025-27672
0.24%
46.7th 9.8 This vulnerability allows attackers to bypass OAuth authentication in Vasion Print (formerly Printer
1421 CVE-2025-58371
0.24%
46.7th 9.8 CVE-2025-58371 is a critical vulnerability in Roo Code versions 3.26.6 and below that allows remote
1422 CVE-2026-22792
0.24%
46.7th 9.6 This vulnerability allows attackers to inject malicious HTML that executes arbitrary JavaScript in t
1423 CVE-2024-4990
0.24%
46.6th 9.1 This vulnerability in Yii2's Component class allows attackers to instantiate arbitrary classes and c
1424 CVE-2024-53298
0.24%
46.6th 9.8 Dell PowerScale OneFS versions 9.5.0.0 through 9.10.0.1 have a critical missing authorization vulner
1425 CVE-2025-36594
0.24%
46.6th 9.8 An authentication bypass vulnerability in Dell PowerProtect Data Domain allows unauthenticated remot
1426 CVE-2025-4578
0.24%
46.5th 9.8 This vulnerability allows unauthenticated attackers to execute arbitrary SQL commands on WordPress s
1427 CVE-2025-8861
0.24%
46.5th 9.8 CVE-2025-8861 is a critical Missing Authentication vulnerability in TSA software developed by Changi
1428 CVE-2022-50589
0.24%
46.5th 9.8 This is a critical SQL injection vulnerability in SuiteCRM's export functionality that allows unauth
1429 CVE-2025-23953
0.24%
46.2th 10.0 This vulnerability allows attackers to upload arbitrary files, including web shells, to web servers
1430 CVE-2024-57579
0.24%
46.2th 9.8 This CVE describes a stack overflow vulnerability in Tenda AC18 routers that allows remote code exec
1431 CVE-2024-29970
0.24%
46.2th 9.8 Fortanix Enclave OS has an interface vulnerability that allows attackers to inject signals, leading
1432 CVE-2024-13285
0.24%
46.2th 9.8 This vulnerability in Drupal's wkhtmltopdf module allows remote code execution through improper inpu
1433 CVE-2025-22504
0.24%
46.2th 10.0 This vulnerability allows attackers to upload arbitrary files, including web shells, to servers runn
1434 CVE-2025-26615
0.24%
46.2th 10.0 A path traversal vulnerability in WeGIA's examples.php endpoint allows attackers to read the config.
1435 CVE-2024-36554
0.24%
46.2th 9.8 This vulnerability in Forever KidsWatch smartwatches allows attackers to remotely extract sensitive
1436 CVE-2025-6380
0.24%
46.2th 9.8 This vulnerability in the ONLYOFFICE Docs WordPress plugin allows unauthenticated attackers to escal
1437 CVE-2024-57077
0.24%
46.2th 9.1 CVE-2024-57077 is a prototype pollution vulnerability in utils-extend library version 1.0.8 that all
1438 CVE-2025-2605
0.24%
46th 9.9 This OS command injection vulnerability in Honeywell MB-Secure allows attackers to execute arbitrary
1439 CVE-2023-37936
0.23%
46th 9.8 This vulnerability allows attackers to execute arbitrary code or commands on affected FortiSwitch de
1440 CVE-2023-25574
0.23%
45.9th 10.0 CVE-2023-25574 is a critical authentication bypass vulnerability in jupyterhub-ltiauthenticator's LT
1441 CVE-2025-24894
0.23%
45.9th 9.1 This vulnerability in SPID.AspNetCore.Authentication allows attackers to bypass SAML signature valid
1442 CVE-2025-6121
0.23%
45.9th 9.8 A critical stack-based buffer overflow vulnerability in D-Link DIR-632 routers allows remote attacke
1443 CVE-2025-53970
0.23%
46th 9.8 This critical vulnerability in SS1 Ver.16.0.0.10 and earlier allows remote unauthenticated attackers
1444 CVE-2025-68109
0.23%
45.9th 9.1 ChurchCRM versions before 6.5.3 have a critical vulnerability in the Database Restore functionality
1445 CVE-2025-24677
0.23%
45.9th 9.9 This vulnerability allows remote attackers to execute arbitrary code on WordPress sites running the
1446 CVE-2025-55575
0.23%
45.8th 9.8 CVE-2025-55575 is a critical SQL injection vulnerability in SMM Panel 3.1 that allows remote attacke
1447 CVE-2025-56333
0.23%
45.9th 9.8 A critical authentication bypass vulnerability in Fossorial Pangolin's 2FA component allows remote a
1448 CVE-2025-22523
0.23%
45.8th 9.3 This SQL injection vulnerability in the NotFound Schedule WordPress plugin allows attackers to execu
1449 CVE-2025-26898
0.23%
45.8th 9.3 This SQL injection vulnerability in the Shinetheme Traveler WordPress theme allows attackers to exec
1450 CVE-2025-39471
0.23%
45.8th 9.3 This SQL injection vulnerability in the Pantherius Modal Survey WordPress plugin allows attackers to

What is EPSS?

The Exploit Prediction Scoring System (EPSS) is a data-driven model developed by FIRST.org that estimates the probability a CVE will be exploited in the wild within the next 30 days. Unlike CVSS which measures severity, EPSS measures likelihood of exploitation — making it ideal for prioritizing which vulnerabilities to patch first.

Why EPSS matters: With thousands of CVEs published monthly, not all vulnerabilities are equally dangerous. EPSS helps security teams focus on the CVEs most likely to be actively exploited, rather than patching solely by CVSS score. A critical CVSS 9.8 vulnerability with 0.1% EPSS may be less urgent than a high CVSS 7.5 with 90% EPSS.

Prioritize by Exploit Risk

Scan your servers and see which vulnerabilities have the highest EPSS scores. Focus on what attackers are actually targeting.

Start Monitoring Free