Most Exploitable CVEs - EPSS Rankings
CVEs ranked by EPSS (Exploit Prediction Scoring System) probability. Higher scores mean a greater likelihood of exploitation in the wild within the next 30 days.
| Rank | CVE ID | EPSS Score | Percentile | CVSS | Flags | Summary |
|---|---|---|---|---|---|---|
| 101 | CVE-2024-57049 |
|
97.7th | 9.8 | This vulnerability allows attackers to bypass authentication on TP-Link Archer C20 routers by adding | |
| 102 | CVE-2014-125117 |
|
97.7th | 9.8 | This critical vulnerability allows unauthenticated attackers to execute arbitrary code with system p | |
| 103 | CVE-2024-12252 |
|
97.6th | 9.8 | The SEO LAT Auto Post WordPress plugin has a critical vulnerability that allows unauthenticated atta | |
| 104 | CVE-2025-5086 |
|
97.5th | 9.0 | KEV | CVE-2025-5086 is a deserialization vulnerability in Dassault Systèmes DELMIA Apriso that allows rem |
| 105 | CVE-2025-25257 |
|
97.5th | 9.8 | KEV | This SQL injection vulnerability in Fortinet FortiWeb web application firewalls allows unauthenticat |
| 106 | CVE-2025-0674 |
|
97.5th | 9.8 | CVE-2025-0674 is an authentication bypass vulnerability affecting multiple Elber products that allow | |
| 107 | CVE-2025-54253 |
|
97.4th | 10.0 | KEV | CVE-2025-54253 is a critical misconfiguration vulnerability in Adobe Experience Manager Forms that a |
| 108 | CVE-2024-54819 |
|
97.4th | 9.1 | CVE-2024-54819 is a Server-Side Request Forgery (SSRF) vulnerability in I, Librarian versions up to | |
| 109 | CVE-2025-23942 |
|
97.4th | 9.1 | This vulnerability allows attackers to upload arbitrary files, including web shells, to WordPress se | |
| 110 | CVE-2025-14733 |
|
97.4th | 9.8 | KEV | A critical out-of-bounds write vulnerability in WatchGuard Fireware OS allows remote unauthenticated |
| 111 | CVE-2025-4632 |
|
97.4th | 9.8 | KEV | This vulnerability allows attackers to write arbitrary files with system-level privileges on Samsung |
| 112 | CVE-2024-56278 |
|
97.4th | 9.1 | This vulnerability allows remote attackers to execute arbitrary PHP code on WordPress sites using th | |
| 113 | CVE-2025-25256 |
|
97.3th | 9.8 | This critical vulnerability allows unauthenticated attackers to execute arbitrary operating system c | |
| 114 | CVE-2025-22968 |
|
97.3th | 9.8 | This critical vulnerability in D-Link DWR-M972V routers allows remote attackers to execute arbitrary | |
| 115 | CVE-2025-54123 |
|
97.3th | 9.8 | This CVE describes a critical command injection vulnerability in Hoverfly's middleware API endpoint | |
| 116 | CVE-2026-1340 |
|
97.2th | 9.8 | This critical vulnerability in Ivanti Endpoint Manager Mobile allows unauthenticated attackers to in | |
| 117 | CVE-2025-49533 |
|
97.2th | 9.8 | Adobe Experience Manager versions 6.5.23.0 and earlier contain a deserialization vulnerability that | |
| 118 | CVE-2025-5306 |
|
97.2th | 9.8 | CVE-2025-5306 is a command injection vulnerability in Pandora FMS that allows attackers to execute a | |
| 119 | CVE-2024-56249 |
|
97.2th | 9.1 | This vulnerability allows attackers to upload arbitrary files, including web shells, to WordPress si | |
| 120 | CVE-2025-8489 |
|
97.2th | 9.8 | This vulnerability in the King Addons for Elementor WordPress plugin allows unauthenticated attacker | |
| 121 | CVE-2025-23006 |
|
97.1th | 9.8 | KEV | A critical pre-authentication deserialization vulnerability in SonicWall SMA1000 management consoles |
| 122 | CVE-2025-64095 |
|
97.1th | 10.0 | This vulnerability allows unauthenticated attackers to upload and overwrite files in DNN CMS systems | |
| 123 | CVE-2025-32429 |
|
97.1th | 9.8 | This CVE describes a critical SQL injection vulnerability in XWiki Platform that allows unauthentica | |
| 124 | CVE-2025-2620 |
|
97th | 9.8 | A critical stack-based buffer overflow vulnerability in D-Link DAP-1620's authentication handler all | |
| 125 | CVE-2025-49132 |
|
96.9th | 10.0 | CVE-2025-49132 is a critical remote code execution vulnerability in Pterodactyl Panel that allows un | |
| 126 | CVE-2025-22952 |
|
96.9th | 9.8 | CVE-2025-22952 is a Server-Side Request Forgery (SSRF) vulnerability in elestio memos v0.23.0 that a | |
| 127 | CVE-2025-31324 |
|
96.9th | 10.0 | KEV | CVE-2025-31324 is an unauthenticated remote code execution vulnerability in SAP NetWeaver Visual Com |
| 128 | CVE-2024-12877 |
|
96.8th | 9.8 | This vulnerability in the GiveWP WordPress plugin allows unauthenticated attackers to perform PHP ob | |
| 129 | CVE-2025-4322 |
|
96.7th | 9.8 | The Motors WordPress theme has a critical privilege escalation vulnerability that allows unauthentic | |
| 130 | CVE-2025-6216 |
|
96.7th | 9.8 | This vulnerability allows remote attackers to bypass authentication in Allegra by exploiting a predi | |
| 131 | CVE-2025-59374 |
|
96.6th | 9.8 | KEV | This CVE describes a supply chain compromise where unauthorized modifications were introduced into c |
| 132 | CVE-2025-11833 |
|
96.5th | 9.8 | This vulnerability allows unauthenticated attackers to read arbitrary email logs stored by the Post | |
| 133 | CVE-2025-25279 |
|
96.5th | 9.9 | This vulnerability in Mattermost Boards allows attackers to read arbitrary files on the server by im | |
| 134 | CVE-2025-24085 |
|
96.4th | 10.0 | KEV | This CVE describes a use-after-free vulnerability (CWE-416) in Apple operating systems that allows m |
| 135 | CVE-2025-24447 |
|
96.4th | 9.1 | This CVE describes a deserialization vulnerability in Adobe ColdFusion that allows attackers to exec | |
| 136 | CVE-2025-47608 |
|
96.4th | 9.3 | This SQL injection vulnerability in the Recover abandoned cart for WooCommerce WordPress plugin allo | |
| 137 | CVE-2024-9193 |
|
96.3th | 9.8 | This vulnerability in the WHMpress WordPress plugin allows unauthenticated attackers to include and | |
| 138 | CVE-2025-66301 |
|
96.3th | 9.6 | This vulnerability allows editors with limited permissions in Grav CMS to modify form processing log | |
| 139 | CVE-2025-4334 |
|
96.2th | 9.8 | The Simple User Registration plugin for WordPress has a privilege escalation vulnerability that allo | |
| 140 | CVE-2025-0364 |
|
96.1th | 9.8 | BigAntSoft BigAnt Server up to version 5.6.06 allows unauthenticated remote attackers to create admi | |
| 141 | CVE-2025-47539 |
|
96.1th | 9.8 | This vulnerability allows attackers to escalate privileges in the Themewinter Eventin WordPress plug | |
| 142 | CVE-2025-53118 |
|
96.1th | 9.8 | An authentication bypass vulnerability in Securden Unified PAM allows unauthenticated attackers to a | |
| 143 | CVE-2024-57968 |
|
96th | 9.9 | KEV | This vulnerability in Advantive VeraCore allows authenticated remote users to upload files to uninte |
| 144 | CVE-2023-25610 |
|
96th | 9.8 | This critical vulnerability allows remote unauthenticated attackers to execute arbitrary code or com | |
| 145 | CVE-2024-10644 |
|
96th | 9.1 | This vulnerability allows remote authenticated administrators to inject malicious code into Ivanti C | |
| 146 | CVE-2025-20281 |
|
95.9th | 10.0 | KEV | An unauthenticated remote code execution vulnerability in Cisco ISE and ISE-PIC API allows attackers |
| 147 | CVE-2025-1307 |
|
95.9th | 9.8 | The Newscrunch WordPress theme contains a vulnerability that allows authenticated users with Subscri | |
| 148 | CVE-2025-66039 |
|
95.9th | 9.8 | FreePBX Endpoint Manager versions before 16.0.44 and 17.0.23 contain an authentication bypass vulner | |
| 149 | CVE-2025-8730 |
|
95.8th | 9.8 | This critical vulnerability in Belkin routers allows attackers to use hard-coded credentials to gain | |
| 150 | CVE-2025-21624 |
|
95.8th | 9.8 | ClipBucket V5 has a file upload vulnerability in the Manage Playlist functionality that allows attac |
What is EPSS?
The Exploit Prediction Scoring System (EPSS) is a data-driven model developed by FIRST.org that estimates the probability a CVE will be exploited in the wild within the next 30 days. Unlike CVSS which measures severity, EPSS measures likelihood of exploitation β making it ideal for prioritizing which vulnerabilities to patch first.
Why EPSS matters: With thousands of CVEs published monthly, not all vulnerabilities are equally dangerous. EPSS helps security teams focus on the CVEs most likely to be actively exploited, rather than patching solely by CVSS score. A critical CVSS 9.8 vulnerability with 0.1% EPSS may be less urgent than a high CVSS 7.5 with 90% EPSS.
Prioritize by Exploit Risk
Scan your servers and see which vulnerabilities have the highest EPSS scores. Focus on what attackers are actually targeting.
Start Monitoring Free