Most Exploitable CVEs - EPSS Rankings
CVEs ranked by EPSS (Exploit Prediction Scoring System) probability. Higher scores mean a greater likelihood of exploitation in the wild within the next 30 days.
| Rank | CVE ID | EPSS Score | Percentile | CVSS | Flags | Summary |
|---|---|---|---|---|---|---|
| 1451 | CVE-2026-23946 |
|
40.5th | 6.8 | This critical vulnerability allows authenticated staff users in Tendenci CMS to execute arbitrary co | |
| 1452 | CVE-2024-6324 |
|
40.3th | 4.3 | A denial-of-service vulnerability in GitLab allows attackers to create cyclic references between epi | |
| 1453 | CVE-2024-38731 |
|
40.3th | 4.3 | This CSRF vulnerability in the Marsian i-amaze WordPress theme allows attackers to trick authenticat | |
| 1454 | CVE-2024-37237 |
|
40.3th | 4.3 | This CSRF vulnerability in the FS Poster WordPress plugin allows attackers to trick authenticated ad | |
| 1455 | CVE-2024-38778 |
|
40.3th | 4.3 | A Cross-Site Request Forgery (CSRF) vulnerability in the WP Fast Total Search WordPress plugin allow | |
| 1456 | CVE-2024-56251 |
|
40.3th | 4.3 | This CVE describes a Cross-Site Request Forgery (CSRF) vulnerability in Event Espresso 4 Decaf, a Wo | |
| 1457 | CVE-2025-25192 |
|
40.4th | 6.5 | CVE-2025-25192 allows low-privileged users in GLPI to enable debug mode, potentially exposing sensit | |
| 1458 | CVE-2025-32360 |
|
40.3th | 4.2 | This vulnerability in Zammad allows logged-in customers to view and manipulate shared article drafts | |
| 1459 | CVE-2024-57681 |
|
40.3th | 5.3 | An access control vulnerability in D-Link DIR-816 routers allows unauthenticated attackers to modify | |
| 1460 | CVE-2025-22139 |
|
40.1th | 6.1 | A reflected cross-site scripting (XSS) vulnerability exists in WeGIA's configuracao_geral.php endpoi | |
| 1461 | CVE-2025-1166 |
|
40.1th | 6.3 | CVE-2025-1166 is a critical unrestricted file upload vulnerability in SourceCodester Food Menu Manag | |
| 1462 | CVE-2024-13403 |
|
40.1th | 6.4 | This vulnerability allows authenticated WordPress users with Contributor-level access or higher to i | |
| 1463 | CVE-2025-3608 |
|
40.1th | 6.5 | A race condition in Firefox's nsHttpTransaction component could allow memory corruption, potentially | |
| 1464 | CVE-2025-51401 |
|
40.1th | 5.4 | A stored cross-site scripting (XSS) vulnerability in Live Helper Chat v4.60 allows attackers to inje | |
| 1465 | CVE-2025-51398 |
|
40.1th | 5.4 | A stored cross-site scripting (XSS) vulnerability in Live Helper Chat v4.60 allows attackers to inje | |
| 1466 | CVE-2025-51396 |
|
40.1th | 5.4 | A stored cross-site scripting (XSS) vulnerability in Live Helper Chat v4.60 allows attackers to inje | |
| 1467 | CVE-2025-54104 |
|
40.1th | 6.7 | A type confusion vulnerability in Windows Defender Firewall Service allows authenticated attackers t | |
| 1468 | CVE-2025-53810 |
|
40.1th | 6.7 | This CVE describes a type confusion vulnerability in the Windows Defender Firewall Service that allo | |
| 1469 | CVE-2024-49354 |
|
40th | 5.3 | IBM Concert versions 1.0.0 through 1.0.2 contain an API vulnerability that allows attackers to extra | |
| 1470 | CVE-2025-0225 |
|
40.1th | 4.3 | This path traversal vulnerability in Tsinghua Unigroup Electronic Archives System allows attackers t | |
| 1471 | CVE-2024-9230 |
|
40th | 5.9 | The PowerPress Podcasting plugin for WordPress before version 11.9.18 has a stored cross-site script | |
| 1472 | CVE-2025-54265 |
|
40th | 5.9 | Adobe Commerce (Magento) versions 2.4.9-alpha2 through 2.4.4-p15 and earlier contain an incorrect au | |
| 1473 | CVE-2025-21268 |
|
40th | 4.3 | This vulnerability allows attackers to bypass the MapUrlToZone security feature in Microsoft Windows | |
| 1474 | CVE-2024-12629 |
|
40th | 4.1 | This CVE describes a prototype pollution vulnerability in Progress Telerik KendoReact components whe | |
| 1475 | CVE-2025-3001 |
|
39.9th | 5.3 | A critical memory corruption vulnerability in PyTorch's torch.lstm_cell function allows local attack | |
| 1476 | CVE-2025-32795 |
|
40th | 6.5 | This CVE describes an improper access control vulnerability in Dify, an open-source LLM app developm | |
| 1477 | CVE-2025-27571 |
|
40th | 4.3 | This vulnerability allows authenticated users to view metadata from archived channels even when the | |
| 1478 | CVE-2025-48069 |
|
39.9th | 6.6 | CVE-2025-48069 is a command injection vulnerability in ejson2env versions before 2.0.8 where insuffi | |
| 1479 | CVE-2025-11254 |
|
39.9th | 4.3 | This CSV injection vulnerability in the Contest Gallery WordPress plugin allows unauthenticated atta | |
| 1480 | CVE-2025-48633 |
|
39.9th | 5.5 | KEV | This vulnerability in Android's DevicePolicyManagerService allows an attacker to add a Device Owner |
| 1481 | CVE-2025-14206 |
|
40th | 6.5 | This vulnerability in SourceCodester Online Student Clearance System 1.0 allows attackers to bypass | |
| 1482 | CVE-2024-52612 |
|
39.8th | 6.8 | SolarWinds Platform contains a reflected cross-site scripting vulnerability that allows authenticate | |
| 1483 | CVE-2025-24278 |
|
39.8th | 5.5 | A symlink validation vulnerability in macOS allows applications to bypass file system protections an | |
| 1484 | CVE-2025-31679 |
|
39.9th | 6.1 | This Cross-Site Scripting (XSS) vulnerability in Drupal's Ignition Error Pages module allows attacke | |
| 1485 | CVE-2025-32379 |
|
39.9th | 5.0 | This vulnerability in Koa.js allows cross-site scripting (XSS) attacks when untrusted user input is | |
| 1486 | CVE-2025-30303 |
|
39.8th | 5.5 | Adobe Framemaker versions 2020.8, 2022.6 and earlier contain an out-of-bounds read vulnerability tha | |
| 1487 | CVE-2025-27202 |
|
39.8th | 5.5 | Adobe Animate versions 24.0.7, 23.0.10 and earlier contain an out-of-bounds read vulnerability that | |
| 1488 | CVE-2025-27186 |
|
39.8th | 5.5 | Adobe After Effects versions 25.1, 24.6.4 and earlier contain an out-of-bounds read vulnerability th | |
| 1489 | CVE-2025-27184 |
|
39.8th | 5.5 | CVE-2025-27184 is an out-of-bounds read vulnerability in Adobe After Effects that could allow an att | |
| 1490 | CVE-2025-5720 |
|
39.9th | 6.4 | This vulnerability allows unauthenticated attackers to inject malicious scripts into WordPress websi | |
| 1491 | CVE-2025-48631 |
|
39.8th | 6.5 | This vulnerability in Android's LocalImageResolver component allows remote attackers to cause persis | |
| 1492 | CVE-2024-7577 |
|
39.6th | 4.4 | IBM InfoSphere Information Server 11.7 may expose sensitive user credentials in log files during new | |
| 1493 | CVE-2024-55029 |
|
39.7th | 6.1 | NASA Fprime v3.4.3 contains multiple cross-site scripting (XSS) vulnerabilities that allow attackers | |
| 1494 | CVE-2025-2744 |
|
39.6th | 5.4 | This critical vulnerability in ruoyi-vue-pro 2.4.1 allows attackers to perform path traversal attack | |
| 1495 | CVE-2024-13895 |
|
39.7th | 4.3 | The Code Snippets CPT WordPress plugin allows authenticated attackers with Subscriber-level access o | |
| 1496 | CVE-2020-36844 |
|
39.7th | 6.1 | This vulnerability allows reflected cross-site scripting (XSS) attacks in KnowBe4 Security Awareness | |
| 1497 | CVE-2025-29015 |
|
39.7th | 6.1 | Code Astro Internet Banking System 2.0.0 contains a stored cross-site scripting vulnerability in the | |
| 1498 | CVE-2025-29710 |
|
39.7th | 6.1 | SourceCodester Company Website CMS 1.0 contains a stored cross-site scripting (XSS) vulnerability in | |
| 1499 | CVE-2025-32230 |
|
39.7th | 4.3 | This vulnerability allows attackers to inject malicious HTML/JavaScript into Tutor LMS web pages thr | |
| 1500 | CVE-2025-3245 |
|
39.7th | 6.3 | This critical SQL injection vulnerability in itsourcecode Library Management System 1.0 allows attac |
What is EPSS?
The Exploit Prediction Scoring System (EPSS) is a data-driven model developed by FIRST.org that estimates the probability a CVE will be exploited in the wild within the next 30 days. Unlike CVSS which measures severity, EPSS measures likelihood of exploitation — making it ideal for prioritizing which vulnerabilities to patch first.
Why EPSS matters: With thousands of CVEs published monthly, not all vulnerabilities are equally dangerous. EPSS helps security teams focus on the CVEs most likely to be actively exploited, rather than patching solely by CVSS score. A critical CVSS 9.8 vulnerability with 0.1% EPSS may be less urgent than a high CVSS 7.5 with 90% EPSS.
Prioritize by Exploit Risk
Scan your servers and see which vulnerabilities have the highest EPSS scores. Focus on what attackers are actually targeting.
Start Monitoring Free