Most Exploitable CVEs - EPSS Rankings

CVEs ranked by EPSS (Exploit Prediction Scoring System) probability. Higher scores mean a greater likelihood of exploitation in the wild within the next 30 days.

164
EPSS > 50%
156
CISA KEV Listed
35,468
CVEs with EPSS
0.7%
Avg EPSS Score
All Critical High Medium Low
Rank CVE ID EPSS Score Percentile CVSS Flags Summary
1551 CVE-2024-12544
0.92%
75.6th 8.8 The SurveyJS WordPress plugin has an arbitrary file deletion vulnerability that allows authenticated
1552 CVE-2025-6174
0.92%
75.5th 6.1 This vulnerability allows attackers to inject malicious scripts via the '_stylesheet' parameter in t
1553 CVE-2025-41229
0.92%
75.5th 8.2 VMware Cloud Foundation contains a directory traversal vulnerability (CWE-22) that allows attackers
1554 CVE-2025-21253
0.92%
75.5th 5.3 Microsoft Edge for iOS and Android contains a spoofing vulnerability that could allow an attacker to
1555 CVE-2024-8060
0.92%
75.5th 8.1 OpenWebUI 0.3.0 has a critical vulnerability in its audio transcription API that allows authenticate
1556 CVE-2025-26260
0.92%
75.5th 8.8 Plenti versions up to 0.7.16 are vulnerable to remote code execution via the /postLocal endpoint. At
1557 CVE-2024-53965
0.92%
75.5th 5.4 This DOM-based XSS vulnerability in Adobe Experience Manager allows low-privileged attackers to exec
1558 CVE-2024-53963
0.92%
75.5th 5.4 This DOM-based XSS vulnerability in Adobe Experience Manager allows low-privileged attackers to exec
1559 CVE-2025-8243
0.91%
75.5th 8.8 This critical buffer overflow vulnerability in TOTOLINK X15 routers allows remote attackers to execu
1560 CVE-2025-31117
0.91%
75.4th 7.5 This Out-of-Band Server-Side Request Forgery (OOB SSRF) vulnerability in OpenEMR allows attackers to
1561 CVE-2026-0795
0.91%
75.4th 8.8 This vulnerability allows authenticated remote attackers to execute arbitrary system commands on ALG
1562 CVE-2025-25003
0.91%
75.3th 7.3 This vulnerability allows an authorized attacker to exploit an uncontrolled search path element in V
1563 CVE-2025-24998
0.91%
75.3th 7.3 This vulnerability allows an authorized attacker to exploit an uncontrolled search path element in V
1564 CVE-2025-52392
0.91%
75.3th 5.4 Soosyze CMS 2.0 has a brute-force vulnerability that allows attackers to make unlimited login attemp
1565 CVE-2023-53892
0.91%
75.3th 7.2 Blackcat CMS 1.4 contains a remote code execution vulnerability that allows authenticated administra
1566 CVE-2024-12132
0.91%
75.3th 4.3 This vulnerability in the WP Job Portal WordPress plugin allows authenticated users with Subscriber-
1567 CVE-2025-29824
0.9%
75.3th 7.8 KEV This is a local privilege escalation vulnerability in the Windows Common Log File System Driver. An
1568 CVE-2024-13786
0.9%
75.3th 9.8 The Education WordPress theme has a PHP object injection vulnerability that allows unauthenticated a
1569 CVE-2025-2009
0.9%
75.2th 7.2 The Newsletters plugin for WordPress has a stored XSS vulnerability in its logging functionality tha
1570 CVE-2025-7154
0.9%
75.3th 6.3 This critical vulnerability in TOTOLINK N200RE routers allows remote attackers to execute arbitrary
1571 CVE-2025-61913
0.9%
75.3th 9.9 This vulnerability in Flowise allows authenticated attackers to read and write arbitrary files anywh
1572 CVE-2025-23045
0.9%
75.2th 9.8 This vulnerability allows authenticated attackers to execute arbitrary code within CVAT's Nuclio fun
1573 CVE-2025-5606
0.9%
75.2th 6.3 This critical vulnerability in Tenda AC18 routers allows remote attackers to execute arbitrary comma
1574 CVE-2024-49649
0.9%
75.2th 9.8 This vulnerability allows attackers to include local files on the server through improper input vali
1575 CVE-2026-23864
0.9%
75.2th 7.5 Multiple denial of service vulnerabilities in React Server Components allow attackers to crash serve
1576 CVE-2025-31140
0.89%
75.1th 4.6 This stored cross-site scripting (XSS) vulnerability in JetBrains TeamCity allows attackers to injec
1577 CVE-2024-10442
0.89%
75.2th 10.0 This critical vulnerability allows remote attackers to execute arbitrary code on affected Synology s
1578 CVE-2025-0960
0.89%
75.1th 9.8 AutomationDirect C-more EA9 HMI devices contain a buffer overflow vulnerability due to insufficient
1579 CVE-2024-9920
0.89%
75.1th 8.8 This vulnerability allows attackers to upload malicious files with dangerous extensions (.py, .sh, .
1580 CVE-2025-34071
0.89%
75.1th 9.8 This critical vulnerability in GFI Kerio Control allows attackers with administrative access to uplo
1581 CVE-2024-54808
0.89%
75.1th 9.8 This CVE describes a critical stack-based buffer overflow vulnerability in Netgear WNR854T routers t
1582 CVE-2025-53416
0.89%
75.1th 7.8 This vulnerability in Delta Electronics DTN Soft allows remote code execution through deserializatio
1583 CVE-2025-53415
0.89%
75.1th 7.8 This vulnerability allows remote code execution through deserialization of untrusted data in Delta E
1584 CVE-2025-25243
0.89%
75th 8.6 CVE-2025-25243 is an unauthenticated arbitrary file download vulnerability in SAP Supplier Relations
1585 CVE-2026-0785
0.89%
75th 8.8 CVE-2026-0785 is a command injection vulnerability in ALGO 8180 IP Audio Alerter devices that allows
1586 CVE-2024-39604
0.89%
75th 9.0 This vulnerability allows remote attackers to execute arbitrary commands on Wavlink AC3000 routers b
1587 CVE-2025-21371
0.88%
75th 8.8 This vulnerability allows remote attackers to execute arbitrary code on Windows systems by exploitin
1588 CVE-2025-2232
0.88%
75th 9.8 This vulnerability allows unauthenticated attackers to register administrator accounts on WordPress
1589 CVE-2025-32050
0.88%
75th 5.9 A buffer under-read vulnerability in libsoup's append_param_quoted() function could allow attackers
1590 CVE-2025-0185
0.88%
75th 8.8 This vulnerability in Dify Tools' Vanna module allows attackers to inject malicious queries through
1591 CVE-2024-46479
0.88%
74.9th 9.9 Venki Supravizio BPM through version 18.0.1 contains an arbitrary file upload vulnerability that all
1592 CVE-2025-3484
0.88%
74.9th 9.8 This critical vulnerability in MedDream PACS Server allows remote attackers to execute arbitrary cod
1593 CVE-2024-13234
0.88%
74.9th 7.5 The Product Table by WBW WordPress plugin contains an SQL injection vulnerability in the 'additional
1594 CVE-2024-12248
0.88%
74.9th 9.8 The Contec Health CMS8000 Patient Monitor has a critical vulnerability (CVE-2024-12248) that allows
1595 CVE-2024-13787
0.88%
74.9th 9.8 This vulnerability in the VEDA WordPress theme allows authenticated attackers with Subscriber-level
1596 CVE-2025-2240
0.88%
74.9th 7.5 CVE-2025-2240 is a memory exhaustion vulnerability in Smallrye Fault Tolerance where repeated calls
1597 CVE-2025-29822
0.88%
74.9th 7.8 This vulnerability allows an unauthorized attacker to bypass a security feature in Microsoft Office
1598 CVE-2025-65879
0.88%
74.8th 8.1 Warehouse Management System 1.2 contains an authenticated arbitrary file deletion vulnerability. Rem
1599 CVE-2025-49744
0.87%
74.8th 7.0 A heap-based buffer overflow vulnerability in Microsoft Graphics Component allows authenticated atta
1600 CVE-2022-40619
0.87%
74.8th 7.7 This vulnerability allows unauthenticated attackers on the local network to execute arbitrary comman

What is EPSS?

The Exploit Prediction Scoring System (EPSS) is a data-driven model developed by FIRST.org that estimates the probability a CVE will be exploited in the wild within the next 30 days. Unlike CVSS which measures severity, EPSS measures likelihood of exploitation — making it ideal for prioritizing which vulnerabilities to patch first.

Why EPSS matters: With thousands of CVEs published monthly, not all vulnerabilities are equally dangerous. EPSS helps security teams focus on the CVEs most likely to be actively exploited, rather than patching solely by CVSS score. A critical CVSS 9.8 vulnerability with 0.1% EPSS may be less urgent than a high CVSS 7.5 with 90% EPSS.

Prioritize by Exploit Risk

Scan your servers and see which vulnerabilities have the highest EPSS scores. Focus on what attackers are actually targeting.

Start Monitoring Free