Most Exploitable CVEs - EPSS Rankings

CVEs ranked by EPSS (Exploit Prediction Scoring System) probability. Higher scores mean a greater likelihood of exploitation in the wild within the next 30 days.

164
EPSS > 50%
156
CISA KEV Listed
35,468
CVEs with EPSS
0.7%
Avg EPSS Score
All Critical High Medium Low
Rank CVE ID EPSS Score Percentile CVSS Flags Summary
101 CVE-2024-57049
48.78%
97.7th 9.8 This vulnerability allows attackers to bypass authentication on TP-Link Archer C20 routers by adding
102 CVE-2014-125117
48.49%
97.7th 9.8 This critical vulnerability allows unauthenticated attackers to execute arbitrary code with system p
103 CVE-2024-12252
47.17%
97.6th 9.8 The SEO LAT Auto Post WordPress plugin has a critical vulnerability that allows unauthenticated atta
104 CVE-2025-5086
45.73%
97.5th 9.0 KEV CVE-2025-5086 is a deserialization vulnerability in Dassault Systèmes DELMIA Apriso that allows rem
105 CVE-2025-25257
45.37%
97.5th 9.8 KEV This SQL injection vulnerability in Fortinet FortiWeb web application firewalls allows unauthenticat
106 CVE-2025-0674
45.03%
97.5th 9.8 CVE-2025-0674 is an authentication bypass vulnerability affecting multiple Elber products that allow
107 CVE-2025-54253
44.1%
97.4th 10.0 KEV CVE-2025-54253 is a critical misconfiguration vulnerability in Adobe Experience Manager Forms that a
108 CVE-2024-54819
43.81%
97.4th 9.1 CVE-2024-54819 is a Server-Side Request Forgery (SSRF) vulnerability in I, Librarian versions up to
109 CVE-2025-23942
43.23%
97.4th 9.1 This vulnerability allows attackers to upload arbitrary files, including web shells, to WordPress se
110 CVE-2025-14733
43.22%
97.4th 9.8 KEV A critical out-of-bounds write vulnerability in WatchGuard Fireware OS allows remote unauthenticated
111 CVE-2025-4632
42.68%
97.4th 9.8 KEV This vulnerability allows attackers to write arbitrary files with system-level privileges on Samsung
112 CVE-2024-56278
42.65%
97.4th 9.1 This vulnerability allows remote attackers to execute arbitrary PHP code on WordPress sites using th
113 CVE-2025-25256
41.42%
97.3th 9.8 This critical vulnerability allows unauthenticated attackers to execute arbitrary operating system c
114 CVE-2025-22968
41.25%
97.3th 9.8 This critical vulnerability in D-Link DWR-M972V routers allows remote attackers to execute arbitrary
115 CVE-2025-54123
40.52%
97.3th 9.8 This CVE describes a critical command injection vulnerability in Hoverfly's middleware API endpoint
116 CVE-2026-1340
40.23%
97.2th 9.8 This critical vulnerability in Ivanti Endpoint Manager Mobile allows unauthenticated attackers to in
117 CVE-2025-49533
40.04%
97.2th 9.8 Adobe Experience Manager versions 6.5.23.0 and earlier contain a deserialization vulnerability that
118 CVE-2025-5306
40.02%
97.2th 9.8 CVE-2025-5306 is a command injection vulnerability in Pandora FMS that allows attackers to execute a
119 CVE-2024-56249
39.61%
97.2th 9.1 This vulnerability allows attackers to upload arbitrary files, including web shells, to WordPress si
120 CVE-2025-8489
39.12%
97.2th 9.8 This vulnerability in the King Addons for Elementor WordPress plugin allows unauthenticated attacker
121 CVE-2025-23006
38.65%
97.1th 9.8 KEV A critical pre-authentication deserialization vulnerability in SonicWall SMA1000 management consoles
122 CVE-2025-64095
38.41%
97.1th 10.0 This vulnerability allows unauthenticated attackers to upload and overwrite files in DNN CMS systems
123 CVE-2025-32429
38.13%
97.1th 9.8 This CVE describes a critical SQL injection vulnerability in XWiki Platform that allows unauthentica
124 CVE-2025-2620
35.61%
97th 9.8 A critical stack-based buffer overflow vulnerability in D-Link DAP-1620's authentication handler all
125 CVE-2025-49132
35.4%
96.9th 10.0 CVE-2025-49132 is a critical remote code execution vulnerability in Pterodactyl Panel that allows un
126 CVE-2025-22952
34.98%
96.9th 9.8 CVE-2025-22952 is a Server-Side Request Forgery (SSRF) vulnerability in elestio memos v0.23.0 that a
127 CVE-2025-31324
34.26%
96.9th 10.0 KEV CVE-2025-31324 is an unauthenticated remote code execution vulnerability in SAP NetWeaver Visual Com
128 CVE-2024-12877
32.91%
96.8th 9.8 This vulnerability in the GiveWP WordPress plugin allows unauthenticated attackers to perform PHP ob
129 CVE-2025-4322
32.26%
96.7th 9.8 The Motors WordPress theme has a critical privilege escalation vulnerability that allows unauthentic
130 CVE-2025-6216
31.43%
96.7th 9.8 This vulnerability allows remote attackers to bypass authentication in Allegra by exploiting a predi
131 CVE-2025-59374
30.93%
96.6th 9.8 KEV This CVE describes a supply chain compromise where unauthorized modifications were introduced into c
132 CVE-2025-11833
30.01%
96.5th 9.8 This vulnerability allows unauthenticated attackers to read arbitrary email logs stored by the Post
133 CVE-2025-25279
29.29%
96.5th 9.9 This vulnerability in Mattermost Boards allows attackers to read arbitrary files on the server by im
134 CVE-2025-24085
28.43%
96.4th 10.0 KEV This CVE describes a use-after-free vulnerability (CWE-416) in Apple operating systems that allows m
135 CVE-2025-24447
28.36%
96.4th 9.1 This CVE describes a deserialization vulnerability in Adobe ColdFusion that allows attackers to exec
136 CVE-2025-47608
28.03%
96.4th 9.3 This SQL injection vulnerability in the Recover abandoned cart for WooCommerce WordPress plugin allo
137 CVE-2024-9193
27.75%
96.3th 9.8 This vulnerability in the WHMpress WordPress plugin allows unauthenticated attackers to include and
138 CVE-2025-66301
27.2%
96.3th 9.6 This vulnerability allows editors with limited permissions in Grav CMS to modify form processing log
139 CVE-2025-4334
26.45%
96.2th 9.8 The Simple User Registration plugin for WordPress has a privilege escalation vulnerability that allo
140 CVE-2025-0364
25.63%
96.1th 9.8 BigAntSoft BigAnt Server up to version 5.6.06 allows unauthenticated remote attackers to create admi
141 CVE-2025-47539
25.33%
96.1th 9.8 This vulnerability allows attackers to escalate privileges in the Themewinter Eventin WordPress plug
142 CVE-2025-53118
25.22%
96.1th 9.8 An authentication bypass vulnerability in Securden Unified PAM allows unauthenticated attackers to a
143 CVE-2024-57968
25.14%
96th 9.9 KEV This vulnerability in Advantive VeraCore allows authenticated remote users to upload files to uninte
144 CVE-2023-25610
25.03%
96th 9.8 This critical vulnerability allows remote unauthenticated attackers to execute arbitrary code or com
145 CVE-2024-10644
24.66%
96th 9.1 This vulnerability allows remote authenticated administrators to inject malicious code into Ivanti C
146 CVE-2025-20281
24.04%
95.9th 10.0 KEV An unauthenticated remote code execution vulnerability in Cisco ISE and ISE-PIC API allows attackers
147 CVE-2025-1307
23.88%
95.9th 9.8 The Newscrunch WordPress theme contains a vulnerability that allows authenticated users with Subscri
148 CVE-2025-66039
23.67%
95.9th 9.8 FreePBX Endpoint Manager versions before 16.0.44 and 17.0.23 contain an authentication bypass vulner
149 CVE-2025-8730
23.28%
95.8th 9.8 This critical vulnerability in Belkin routers allows attackers to use hard-coded credentials to gain
150 CVE-2025-21624
23.02%
95.8th 9.8 ClipBucket V5 has a file upload vulnerability in the Manage Playlist functionality that allows attac

What is EPSS?

The Exploit Prediction Scoring System (EPSS) is a data-driven model developed by FIRST.org that estimates the probability a CVE will be exploited in the wild within the next 30 days. Unlike CVSS which measures severity, EPSS measures likelihood of exploitation β€” making it ideal for prioritizing which vulnerabilities to patch first.

Why EPSS matters: With thousands of CVEs published monthly, not all vulnerabilities are equally dangerous. EPSS helps security teams focus on the CVEs most likely to be actively exploited, rather than patching solely by CVSS score. A critical CVSS 9.8 vulnerability with 0.1% EPSS may be less urgent than a high CVSS 7.5 with 90% EPSS.

Prioritize by Exploit Risk

Scan your servers and see which vulnerabilities have the highest EPSS scores. Focus on what attackers are actually targeting.

Start Monitoring Free