Most Exploitable CVEs - EPSS Rankings

CVEs ranked by EPSS (Exploit Prediction Scoring System) probability. Higher scores mean a greater likelihood of exploitation in the wild within the next 30 days.

164
EPSS > 50%
156
CISA KEV Listed
35,468
CVEs with EPSS
0.7%
Avg EPSS Score
All Critical High Medium Low
Rank CVE ID EPSS Score Percentile CVSS Flags Summary
1551 CVE-2025-4555
0.21%
42.5th 9.8 The Okcat Parking Management Platform web management interface lacks authentication controls, allowi
1552 CVE-2024-57703
0.2%
42.4th 9.8 This vulnerability allows remote attackers to execute arbitrary code on Tenda AC8v4 routers by explo
1553 CVE-2024-13258
0.2%
42.4th 9.8 This vulnerability allows attackers to bypass authorization controls in Drupal's REST & JSON API Aut
1554 CVE-2024-13239
0.2%
42.4th 9.8 A weak authentication vulnerability in Drupal's Two-factor Authentication (TFA) module allows attack
1555 CVE-2025-34192
0.2%
42.4th 9.8 This vulnerability affects Vasion Print (formerly PrinterLogic) deployments using outdated OpenSSL 1
1556 CVE-2022-41572
0.2%
42.3th 9.8 CVE-2022-41572 is a privilege escalation vulnerability in EyesOfNetwork (EON) where nmap can be exec
1557 CVE-2026-22793
0.2%
42.2th 9.6 CVE-2026-22793 is an unsafe option parsing vulnerability in the ECharts Markdown plugin of the 5ire
1558 CVE-2024-57328
0.2%
42.1th 9.8 This SQL injection vulnerability in Online Food Ordering System v1.0 allows attackers to bypass auth
1559 CVE-2025-0070
0.2%
42.2th 9.9 CVE-2025-0070 is an authentication bypass vulnerability in SAP NetWeaver Application Server for ABAP
1560 CVE-2024-55078
0.2%
42.2th 9.8 This vulnerability allows unauthenticated attackers to upload arbitrary files to the WukongCRM syste
1561 CVE-2023-34399
0.2%
42.2th 9.8 This vulnerability in Mercedes-Benz NTG6 head units allows integer overflow in the Boost library whe
1562 CVE-2025-44961
0.2%
42.1th 9.9 This vulnerability allows authenticated users to execute arbitrary operating system commands by inje
1563 CVE-2024-41783
0.2%
42.1th 9.1 This vulnerability in IBM Sterling Secure Proxy allows privileged users to execute arbitrary operati
1564 CVE-2026-26216
0.2%
42.1th 10.0 Crawl4AI versions before 0.8.0 contain an unauthenticated remote code execution vulnerability in the
1565 CVE-2025-50972
0.2%
42th 9.8 CVE-2025-50972 is a critical SQL injection vulnerability in AbanteCart e-commerce software that allo
1566 CVE-2025-11008
0.2%
42.1th 9.8 The CE21 Suite WordPress plugin exposes sensitive authentication credentials in log files, allowing
1567 CVE-2024-51450
0.2%
42th 9.1 CVE-2024-51450 is an OS command injection vulnerability in IBM Security Verify Directory that allows
1568 CVE-2025-4918
0.2%
41.9th 9.8 This vulnerability allows an attacker to perform out-of-bounds memory operations on JavaScript Promi
1569 CVE-2025-4557
0.2%
41.9th 9.1 The ZONG YU Parking Management System has missing authentication on specific APIs, allowing unauthen
1570 CVE-2024-32555
0.2%
41.7th 9.8 This vulnerability allows attackers to escalate privileges in the Easy Real Estate WordPress plugin
1571 CVE-2024-48126
0.2%
41.7th 9.8 The HI-SCAN 6040i Hitrax HX-03-19-I security scanner contains hardcoded credentials that provide ven
1572 CVE-2024-51547
0.2%
41.7th 9.8 This CVE describes a use of hard-coded credentials vulnerability in multiple ABB industrial control
1573 CVE-2025-27270
0.2%
41.7th 9.8 This CVE describes a missing authorization vulnerability in the WordPress Residential Address Detect
1574 CVE-2024-12827
0.2%
41.8th 9.8 This vulnerability allows unauthenticated attackers to reset passwords for any user account in the D
1575 CVE-2025-51683
0.2%
41.7th 9.8 An unauthenticated blind SQL injection vulnerability in mJobtime v15.7.2 allows attackers to execute
1576 CVE-2025-56425
0.2%
41.7th 9.1 This vulnerability allows authenticated remote attackers to inject arbitrary SMTP commands via craft
1577 CVE-2025-24671
0.2%
41.7th 9.8 This CVE describes a PHP object injection vulnerability in the Pdfcrowd Save as PDF WordPress plugin
1578 CVE-2025-24601
0.2%
41.7th 9.8 This vulnerability allows attackers to execute arbitrary code on WordPress sites running the vulnera
1579 CVE-2024-50694
0.2%
41.5th 9.8 This vulnerability allows remote attackers to execute arbitrary code on SunGrow WiNet-SV200 devices
1580 CVE-2025-23914
0.2%
41.7th 9.8 This vulnerability allows attackers to execute arbitrary code through PHP object injection by exploi
1581 CVE-2025-26900
0.2%
41.7th 9.8 This vulnerability allows attackers to inject malicious objects through deserialization of untrusted
1582 CVE-2025-27816
0.2%
41.7th 9.8 This vulnerability allows remote code execution on Arctera InfoScale servers through insecure deseri
1583 CVE-2025-46557
0.2%
41.6th 9.8 This vulnerability allows any user with access to XWiki pages to switch authentication methods, pote
1584 CVE-2025-10542
0.2%
41.5th 9.8 iMonitor EAM 9.6394 ships with hardcoded default administrative credentials that are visible in the
1585 CVE-2024-54530
0.2%
41.5th 9.1 This vulnerability allows password autofill to fill passwords even after authentication fails, poten
1586 CVE-2024-8196
0.2%
41.4th 9.8 The Anything-LLM desktop application for Windows opens port 3001 on all network interfaces (0.0.0.0)
1587 CVE-2024-6584
0.2%
41.5th 9.1 This vulnerability in WordPress allows administrators to make arbitrary GET requests to any URL thro
1588 CVE-2025-31493
0.2%
41.5th 9.1 This is a path traversal vulnerability in Kirby CMS that allows attackers to access and execute arbi
1589 CVE-2025-60964
0.2%
41.4th 9.1 This CVE describes an OS command injection vulnerability in EndRun Technologies Sonoma D12 Network T
1590 CVE-2024-57768
0.2%
41.3th 9.8 This SQL injection vulnerability in JFinalOA allows attackers to execute arbitrary SQL commands thro
1591 CVE-2024-13253
0.2%
41.3th 9.1 This CVE describes an incorrect authorization vulnerability in Drupal's Advanced PWA inc Push Notifi
1592 CVE-2025-6098
0.2%
41.4th 9.8 This critical vulnerability in UTT 进取 750W devices allows remote attackers to execute arbitrary
1593 CVE-2025-54493
0.2%
41.4th 9.8 A critical stack-based buffer overflow vulnerability in libbiosig's MFER parsing allows arbitrary co
1594 CVE-2025-54491
0.2%
41.4th 9.8 A critical stack-based buffer overflow vulnerability in libbiosig's MFER parsing allows arbitrary co
1595 CVE-2025-54489
0.2%
41.4th 9.8 A stack-based buffer overflow vulnerability in libbiosig's MFER parsing allows arbitrary code execut
1596 CVE-2025-54487
0.2%
41.4th 9.8 A critical stack-based buffer overflow vulnerability in libbiosig's MFER parsing allows arbitrary co
1597 CVE-2025-54485
0.2%
41.4th 9.8 A critical stack-based buffer overflow vulnerability in libbiosig's MFER parsing allows arbitrary co
1598 CVE-2025-54483
0.2%
41.4th 9.8 A critical stack-based buffer overflow vulnerability in libbiosig's MFER file parser allows arbitrar
1599 CVE-2025-54481
0.2%
41.4th 9.8 A stack-based buffer overflow vulnerability in libbiosig's MFER parsing allows arbitrary code execut
1600 CVE-2025-54462
0.2%
41.4th 9.8 A heap-based buffer overflow vulnerability in libbiosig's Nex file parser allows arbitrary code exec

What is EPSS?

The Exploit Prediction Scoring System (EPSS) is a data-driven model developed by FIRST.org that estimates the probability a CVE will be exploited in the wild within the next 30 days. Unlike CVSS which measures severity, EPSS measures likelihood of exploitation β€” making it ideal for prioritizing which vulnerabilities to patch first.

Why EPSS matters: With thousands of CVEs published monthly, not all vulnerabilities are equally dangerous. EPSS helps security teams focus on the CVEs most likely to be actively exploited, rather than patching solely by CVSS score. A critical CVSS 9.8 vulnerability with 0.1% EPSS may be less urgent than a high CVSS 7.5 with 90% EPSS.

Prioritize by Exploit Risk

Scan your servers and see which vulnerabilities have the highest EPSS scores. Focus on what attackers are actually targeting.

Start Monitoring Free