Most Exploitable CVEs - EPSS Rankings

CVEs ranked by EPSS (Exploit Prediction Scoring System) probability. Higher scores mean a greater likelihood of exploitation in the wild within the next 30 days.

164
EPSS > 50%
156
CISA KEV Listed
35,468
CVEs with EPSS
0.7%
Avg EPSS Score
All Critical High Medium Low
Rank CVE ID EPSS Score Percentile CVSS Flags Summary
101 CVE-2025-6095
24.66%
96th 7.3 CVE-2025-6095 is a critical SQL injection vulnerability in Jasmin Ransomware 1.0.1 that allows remot
102 CVE-2025-54782
24.36%
96th 8.8 A critical Remote Code Execution vulnerability in @nestjs/devtools-integration package allows malici
103 CVE-2024-13478
24.34%
96th 7.5 This SQL injection vulnerability in the LTL Freight Quotes WordPress plugin allows unauthenticated a
104 CVE-2025-5946
24.09%
95.9th 7.2 This OS command injection vulnerability in Centreon Infra Monitoring allows authenticated high-privi
105 CVE-2025-21420
23.5%
95.8th 7.8 This vulnerability allows an authenticated attacker to exploit the Windows Disk Cleanup Tool to gain
106 CVE-2024-12157
22.91%
95.8th 7.5 This SQL injection vulnerability in the Popup plugin for WordPress allows unauthenticated attackers
107 CVE-2025-2010
22.83%
95.8th 7.5 This SQL injection vulnerability in the JobWP WordPress plugin allows unauthenticated attackers to i
108 CVE-2025-21351
22.08%
95.6th 7.5 This vulnerability in Windows Active Directory Domain Services API allows attackers to cause a denia
109 CVE-2025-8110
22.03%
95.6th 8.8 KEV CVE-2025-8110 is a path traversal vulnerability in Gogs' PutContents API that allows improper symbol
110 CVE-2025-34076
21.32%
95.6th 7.2 An authenticated local file inclusion vulnerability in Microweber CMS allows authenticated users to
111 CVE-2025-30397
21.27%
95.5th 7.5 KEV A type confusion vulnerability in Microsoft Scripting Engine allows remote attackers to execute arbi
112 CVE-2025-4396
21.05%
95.5th 7.5 The Relevanssi WordPress plugin has a time-based SQL injection vulnerability in its search functiona
113 CVE-2024-56902
20.8%
95.5th 7.5 This vulnerability in Geovision GV-ASManager web application versions v6.1.0.0 and earlier allows at
114 CVE-2025-1097
20.8%
95.5th 8.8 CVE-2025-1097 is a critical vulnerability in ingress-nginx where the auth-tls-match-cn annotation ca
115 CVE-2025-64328
20.56%
95.4th 7.2 KEV FreePBX Endpoint Manager's filestore module contains a post-authentication command injection vulnera
116 CVE-2025-21277
20.14%
95.3th 7.5 This vulnerability in Microsoft Message Queuing (MSMQ) allows attackers to cause a denial of service
117 CVE-2024-13322
20.05%
95.3th 7.5 This SQL injection vulnerability in the Ads Pro WordPress plugin allows unauthenticated attackers to
118 CVE-2025-12490
19.7%
95.3th 8.8 This vulnerability allows authenticated remote attackers to create arbitrary files on Netgate pfSens
119 CVE-2025-55184
19.24%
95.2th 7.5 A pre-authentication denial of service vulnerability in React Server Components allows attackers to
120 CVE-2025-5287
19.24%
95.2th 7.5 This SQL injection vulnerability in the WordPress Likes and Dislikes Plugin allows unauthenticated a
121 CVE-2025-34045
18.59%
95.1th 7.5 A path traversal vulnerability in WeiPHP 5.0 allows unauthenticated remote attackers to read arbitra
122 CVE-2026-22200
18.47%
95.1th 7.5 This vulnerability allows remote attackers to read arbitrary files from the osTicket server filesyst
123 CVE-2024-13488
18.19%
95th 7.5 This SQL injection vulnerability in the LTL Freight Quotes – Estes Edition WordPress plugin allows
124 CVE-2023-47179
17.82%
95th 8.8 CVE-2023-47179 is a missing authorization vulnerability in ByConsole WooODT Lite WordPress plugin th
125 CVE-2024-7014
17.55%
94.9th 8.1 The EvilVideo vulnerability in Telegram for Android allows attackers to send malicious applications
126 CVE-2025-25163
17.53%
94.9th 7.5 This path traversal vulnerability in the WordPress Plugin A/B Image Optimizer allows attackers to do
127 CVE-2024-12535
17.43%
94.9th 8.6 The Host PHP Info WordPress plugin allows unauthenticated attackers to access sensitive server confi
128 CVE-2024-31903
17.08%
94.8th 8.8 This vulnerability allows attackers on the local network to execute arbitrary code on IBM Sterling B
129 CVE-2025-36604
16.77%
94.8th 7.3 This CVE describes an OS command injection vulnerability in Dell Unity storage systems. Unauthentica
130 CVE-2025-4380
16.51%
94.7th 8.1 This vulnerability allows unauthenticated attackers to include and execute arbitrary PHP files on Wo
131 CVE-2025-6771
16.44%
94.7th 7.2 This vulnerability allows authenticated attackers with high privileges in Ivanti Endpoint Manager Mo
132 CVE-2025-2476
16.42%
94.7th 8.8 This critical vulnerability in Google Chrome's Lens feature allows remote attackers to execute arbit
133 CVE-2025-8085
16.34%
94.7th 8.6 The Ditty WordPress plugin before version 3.1.58 has an authentication bypass vulnerability in its d
134 CVE-2025-29471
15.96%
94.6th 8.3 A Cross-Site Scripting (XSS) vulnerability in Nagios Log Server v.2024R1.3.1 allows remote attackers
135 CVE-2025-6804
15.61%
94.5th 7.5 This vulnerability allows unauthenticated remote attackers to perform directory traversal attacks on
136 CVE-2025-6800
15.61%
94.5th 7.5 This vulnerability allows unauthenticated remote attackers to read arbitrary files on systems runnin
137 CVE-2025-6797
15.61%
94.5th 7.5 This vulnerability allows unauthenticated remote attackers to read arbitrary files on Marvell QConve
138 CVE-2025-48954
15.58%
94.5th 8.1 Discourse versions before 3.5.0.beta6 are vulnerable to cross-site scripting (XSS) when social login
139 CVE-2025-63387
15.48%
94.5th 7.5 CVE-2025-63387 is an insecure permissions vulnerability in Dify v1.9.1 that allows unauthenticated a
140 CVE-2025-21276
15.44%
94.5th 7.5 This vulnerability in Windows MapUrlToZone function allows attackers to cause denial of service by c
141 CVE-2025-30154
15.4%
94.5th 8.6 KEV CVE-2025-30154 is a supply chain attack where the reviewdog/action-setup GitHub Action was compromis
142 CVE-2025-22710
15.38%
94.5th 7.6 This SQL injection vulnerability in the StoreApps Smart Manager WordPress plugin allows attackers to
143 CVE-2024-13485
15.13%
94.4th 7.5 This SQL injection vulnerability in the LTL Freight Quotes WordPress plugin allows unauthenticated a
144 CVE-2024-13481
15.13%
94.4th 7.5 This SQL injection vulnerability in the LTL Freight Quotes WordPress plugin allows unauthenticated a
145 CVE-2025-24587
14.68%
94.3th 7.6 This SQL injection vulnerability in the Email Subscription Popup WordPress plugin allows attackers t
146 CVE-2024-13181
14.59%
94.3th 7.3 CVE-2024-13181 is a path traversal vulnerability in Ivanti Avalanche that allows remote unauthentica
147 CVE-2025-34031
14.52%
94.3th 7.5 A path traversal vulnerability in Moodle LMS Jmol plugin versions 6.1 and earlier allows unauthentic
148 CVE-2025-3928
14.47%
94.3th 8.8 KEV CVE-2025-3928 is a vulnerability in Commvault Web Server that allows authenticated remote attackers
149 CVE-2025-59502
14.06%
94.2th 7.5 This vulnerability in Windows Remote Procedure Call allows unauthorized attackers to cause denial of
150 CVE-2025-34291
14.04%
94.2th 8.8 This vulnerability in Langflow allows attackers to hijack user sessions through a CORS misconfigurat

What is EPSS?

The Exploit Prediction Scoring System (EPSS) is a data-driven model developed by FIRST.org that estimates the probability a CVE will be exploited in the wild within the next 30 days. Unlike CVSS which measures severity, EPSS measures likelihood of exploitation — making it ideal for prioritizing which vulnerabilities to patch first.

Why EPSS matters: With thousands of CVEs published monthly, not all vulnerabilities are equally dangerous. EPSS helps security teams focus on the CVEs most likely to be actively exploited, rather than patching solely by CVSS score. A critical CVSS 9.8 vulnerability with 0.1% EPSS may be less urgent than a high CVSS 7.5 with 90% EPSS.

Prioritize by Exploit Risk

Scan your servers and see which vulnerabilities have the highest EPSS scores. Focus on what attackers are actually targeting.

Start Monitoring Free