Most Exploitable CVEs - EPSS Rankings
CVEs ranked by EPSS (Exploit Prediction Scoring System) probability. Higher scores mean a greater likelihood of exploitation in the wild within the next 30 days.
| Rank | CVE ID | EPSS Score | Percentile | CVSS | Flags | Summary |
|---|---|---|---|---|---|---|
| 101 | CVE-2025-6095 |
|
96th | 7.3 | CVE-2025-6095 is a critical SQL injection vulnerability in Jasmin Ransomware 1.0.1 that allows remot | |
| 102 | CVE-2025-54782 |
|
96th | 8.8 | A critical Remote Code Execution vulnerability in @nestjs/devtools-integration package allows malici | |
| 103 | CVE-2024-13478 |
|
96th | 7.5 | This SQL injection vulnerability in the LTL Freight Quotes WordPress plugin allows unauthenticated a | |
| 104 | CVE-2025-5946 |
|
95.9th | 7.2 | This OS command injection vulnerability in Centreon Infra Monitoring allows authenticated high-privi | |
| 105 | CVE-2025-21420 |
|
95.8th | 7.8 | This vulnerability allows an authenticated attacker to exploit the Windows Disk Cleanup Tool to gain | |
| 106 | CVE-2024-12157 |
|
95.8th | 7.5 | This SQL injection vulnerability in the Popup plugin for WordPress allows unauthenticated attackers | |
| 107 | CVE-2025-2010 |
|
95.8th | 7.5 | This SQL injection vulnerability in the JobWP WordPress plugin allows unauthenticated attackers to i | |
| 108 | CVE-2025-21351 |
|
95.6th | 7.5 | This vulnerability in Windows Active Directory Domain Services API allows attackers to cause a denia | |
| 109 | CVE-2025-8110 |
|
95.6th | 8.8 | KEV | CVE-2025-8110 is a path traversal vulnerability in Gogs' PutContents API that allows improper symbol |
| 110 | CVE-2025-34076 |
|
95.6th | 7.2 | An authenticated local file inclusion vulnerability in Microweber CMS allows authenticated users to | |
| 111 | CVE-2025-30397 |
|
95.5th | 7.5 | KEV | A type confusion vulnerability in Microsoft Scripting Engine allows remote attackers to execute arbi |
| 112 | CVE-2025-4396 |
|
95.5th | 7.5 | The Relevanssi WordPress plugin has a time-based SQL injection vulnerability in its search functiona | |
| 113 | CVE-2024-56902 |
|
95.5th | 7.5 | This vulnerability in Geovision GV-ASManager web application versions v6.1.0.0 and earlier allows at | |
| 114 | CVE-2025-1097 |
|
95.5th | 8.8 | CVE-2025-1097 is a critical vulnerability in ingress-nginx where the auth-tls-match-cn annotation ca | |
| 115 | CVE-2025-64328 |
|
95.4th | 7.2 | KEV | FreePBX Endpoint Manager's filestore module contains a post-authentication command injection vulnera |
| 116 | CVE-2025-21277 |
|
95.3th | 7.5 | This vulnerability in Microsoft Message Queuing (MSMQ) allows attackers to cause a denial of service | |
| 117 | CVE-2024-13322 |
|
95.3th | 7.5 | This SQL injection vulnerability in the Ads Pro WordPress plugin allows unauthenticated attackers to | |
| 118 | CVE-2025-12490 |
|
95.3th | 8.8 | This vulnerability allows authenticated remote attackers to create arbitrary files on Netgate pfSens | |
| 119 | CVE-2025-55184 |
|
95.2th | 7.5 | A pre-authentication denial of service vulnerability in React Server Components allows attackers to | |
| 120 | CVE-2025-5287 |
|
95.2th | 7.5 | This SQL injection vulnerability in the WordPress Likes and Dislikes Plugin allows unauthenticated a | |
| 121 | CVE-2025-34045 |
|
95.1th | 7.5 | A path traversal vulnerability in WeiPHP 5.0 allows unauthenticated remote attackers to read arbitra | |
| 122 | CVE-2026-22200 |
|
95.1th | 7.5 | This vulnerability allows remote attackers to read arbitrary files from the osTicket server filesyst | |
| 123 | CVE-2024-13488 |
|
95th | 7.5 | This SQL injection vulnerability in the LTL Freight Quotes – Estes Edition WordPress plugin allows | |
| 124 | CVE-2023-47179 |
|
95th | 8.8 | CVE-2023-47179 is a missing authorization vulnerability in ByConsole WooODT Lite WordPress plugin th | |
| 125 | CVE-2024-7014 |
|
94.9th | 8.1 | The EvilVideo vulnerability in Telegram for Android allows attackers to send malicious applications | |
| 126 | CVE-2025-25163 |
|
94.9th | 7.5 | This path traversal vulnerability in the WordPress Plugin A/B Image Optimizer allows attackers to do | |
| 127 | CVE-2024-12535 |
|
94.9th | 8.6 | The Host PHP Info WordPress plugin allows unauthenticated attackers to access sensitive server confi | |
| 128 | CVE-2024-31903 |
|
94.8th | 8.8 | This vulnerability allows attackers on the local network to execute arbitrary code on IBM Sterling B | |
| 129 | CVE-2025-36604 |
|
94.8th | 7.3 | This CVE describes an OS command injection vulnerability in Dell Unity storage systems. Unauthentica | |
| 130 | CVE-2025-4380 |
|
94.7th | 8.1 | This vulnerability allows unauthenticated attackers to include and execute arbitrary PHP files on Wo | |
| 131 | CVE-2025-6771 |
|
94.7th | 7.2 | This vulnerability allows authenticated attackers with high privileges in Ivanti Endpoint Manager Mo | |
| 132 | CVE-2025-2476 |
|
94.7th | 8.8 | This critical vulnerability in Google Chrome's Lens feature allows remote attackers to execute arbit | |
| 133 | CVE-2025-8085 |
|
94.7th | 8.6 | The Ditty WordPress plugin before version 3.1.58 has an authentication bypass vulnerability in its d | |
| 134 | CVE-2025-29471 |
|
94.6th | 8.3 | A Cross-Site Scripting (XSS) vulnerability in Nagios Log Server v.2024R1.3.1 allows remote attackers | |
| 135 | CVE-2025-6804 |
|
94.5th | 7.5 | This vulnerability allows unauthenticated remote attackers to perform directory traversal attacks on | |
| 136 | CVE-2025-6800 |
|
94.5th | 7.5 | This vulnerability allows unauthenticated remote attackers to read arbitrary files on systems runnin | |
| 137 | CVE-2025-6797 |
|
94.5th | 7.5 | This vulnerability allows unauthenticated remote attackers to read arbitrary files on Marvell QConve | |
| 138 | CVE-2025-48954 |
|
94.5th | 8.1 | Discourse versions before 3.5.0.beta6 are vulnerable to cross-site scripting (XSS) when social login | |
| 139 | CVE-2025-63387 |
|
94.5th | 7.5 | CVE-2025-63387 is an insecure permissions vulnerability in Dify v1.9.1 that allows unauthenticated a | |
| 140 | CVE-2025-21276 |
|
94.5th | 7.5 | This vulnerability in Windows MapUrlToZone function allows attackers to cause denial of service by c | |
| 141 | CVE-2025-30154 |
|
94.5th | 8.6 | KEV | CVE-2025-30154 is a supply chain attack where the reviewdog/action-setup GitHub Action was compromis |
| 142 | CVE-2025-22710 |
|
94.5th | 7.6 | This SQL injection vulnerability in the StoreApps Smart Manager WordPress plugin allows attackers to | |
| 143 | CVE-2024-13485 |
|
94.4th | 7.5 | This SQL injection vulnerability in the LTL Freight Quotes WordPress plugin allows unauthenticated a | |
| 144 | CVE-2024-13481 |
|
94.4th | 7.5 | This SQL injection vulnerability in the LTL Freight Quotes WordPress plugin allows unauthenticated a | |
| 145 | CVE-2025-24587 |
|
94.3th | 7.6 | This SQL injection vulnerability in the Email Subscription Popup WordPress plugin allows attackers t | |
| 146 | CVE-2024-13181 |
|
94.3th | 7.3 | CVE-2024-13181 is a path traversal vulnerability in Ivanti Avalanche that allows remote unauthentica | |
| 147 | CVE-2025-34031 |
|
94.3th | 7.5 | A path traversal vulnerability in Moodle LMS Jmol plugin versions 6.1 and earlier allows unauthentic | |
| 148 | CVE-2025-3928 |
|
94.3th | 8.8 | KEV | CVE-2025-3928 is a vulnerability in Commvault Web Server that allows authenticated remote attackers |
| 149 | CVE-2025-59502 |
|
94.2th | 7.5 | This vulnerability in Windows Remote Procedure Call allows unauthorized attackers to cause denial of | |
| 150 | CVE-2025-34291 |
|
94.2th | 8.8 | This vulnerability in Langflow allows attackers to hijack user sessions through a CORS misconfigurat |
What is EPSS?
The Exploit Prediction Scoring System (EPSS) is a data-driven model developed by FIRST.org that estimates the probability a CVE will be exploited in the wild within the next 30 days. Unlike CVSS which measures severity, EPSS measures likelihood of exploitation — making it ideal for prioritizing which vulnerabilities to patch first.
Why EPSS matters: With thousands of CVEs published monthly, not all vulnerabilities are equally dangerous. EPSS helps security teams focus on the CVEs most likely to be actively exploited, rather than patching solely by CVSS score. A critical CVSS 9.8 vulnerability with 0.1% EPSS may be less urgent than a high CVSS 7.5 with 90% EPSS.
Prioritize by Exploit Risk
Scan your servers and see which vulnerabilities have the highest EPSS scores. Focus on what attackers are actually targeting.
Start Monitoring Free