Most Exploitable CVEs - EPSS Rankings
CVEs ranked by EPSS (Exploit Prediction Scoring System) probability. Higher scores mean a greater likelihood of exploitation in the wild within the next 30 days.
| Rank | CVE ID | EPSS Score | Percentile | CVSS | Flags | Summary |
|---|---|---|---|---|---|---|
| 1751 | CVE-2025-30448 |
|
37.7th | 9.1 | This vulnerability allows an attacker to enable iCloud folder sharing without proper authentication. | |
| 1752 | CVE-2025-26852 |
|
37.6th | 10.0 | DESCOR INFOCAD versions 3.5.1 and earlier contain a SQL injection vulnerability that allows attacker | |
| 1753 | CVE-2025-9971 |
|
37.6th | 9.8 | Planet Technology Industrial Cellular Gateways have a missing authentication vulnerability that allo | |
| 1754 | CVE-2025-68987 |
|
37.5th | 9.8 | This vulnerability allows attackers to include and execute arbitrary local files on servers running | |
| 1755 | CVE-2025-68985 |
|
37.5th | 9.8 | This vulnerability allows attackers to include local files on the server through improper filename c | |
| 1756 | CVE-2025-68984 |
|
37.5th | 9.8 | This vulnerability allows attackers to include local files on the server through improper filename c | |
| 1757 | CVE-2025-68983 |
|
37.5th | 9.8 | This vulnerability allows attackers to include local PHP files through improper filename control in | |
| 1758 | CVE-2025-68974 |
|
37.5th | 9.8 | This vulnerability allows attackers to include local files on the server through the WordPress Socia | |
| 1759 | CVE-2025-68563 |
|
37.5th | 9.8 | This CVE describes a PHP Local File Inclusion vulnerability in the WordPress Subscribe to Unlock Lit | |
| 1760 | CVE-2025-68540 |
|
37.5th | 9.8 | This vulnerability allows attackers to include arbitrary local files through PHP's include/require s | |
| 1761 | CVE-2025-68537 |
|
37.5th | 9.8 | This vulnerability allows attackers to include local files on the server through improper filename c | |
| 1762 | CVE-2025-68530 |
|
37.5th | 9.8 | This CVE describes a PHP Local File Inclusion vulnerability in the Bookory WordPress theme. Attacker | |
| 1763 | CVE-2025-68506 |
|
37.5th | 9.8 | This CVE describes a PHP Local File Inclusion vulnerability in the Docket Cache WordPress plugin. At | |
| 1764 | CVE-2025-53433 |
|
37.5th | 9.8 | This vulnerability allows attackers to include local files on the server through improper filename c | |
| 1765 | CVE-2025-67532 |
|
37.5th | 9.8 | This vulnerability allows attackers to include local files on the server through improper filename c | |
| 1766 | CVE-2025-67531 |
|
37.5th | 9.8 | This CVE describes a PHP Local File Inclusion vulnerability in the Turitor WordPress theme. Attacker | |
| 1767 | CVE-2025-67530 |
|
37.5th | 9.8 | This vulnerability allows attackers to include local files on the server through improper filename c | |
| 1768 | CVE-2025-67529 |
|
37.5th | 9.8 | This vulnerability allows attackers to include arbitrary local files via PHP's include/require state | |
| 1769 | CVE-2025-67527 |
|
37.5th | 9.8 | This vulnerability allows attackers to include local files on the server through improper filename c | |
| 1770 | CVE-2025-67526 |
|
37.5th | 9.8 | This vulnerability allows attackers to include local files on the server through improper filename c | |
| 1771 | CVE-2025-67525 |
|
37.5th | 9.8 | This vulnerability allows attackers to include local files on the server through improper filename c | |
| 1772 | CVE-2025-67524 |
|
37.5th | 9.8 | This vulnerability allows attackers to include local files on the server through improper filename c | |
| 1773 | CVE-2025-67523 |
|
37.5th | 9.8 | This CVE describes a PHP Local File Inclusion vulnerability in the Exhibz WordPress theme that allow | |
| 1774 | CVE-2025-67522 |
|
37.5th | 9.8 | This CVE describes a PHP Local File Inclusion vulnerability in the NooTheme Jobmonster WordPress the | |
| 1775 | CVE-2025-67521 |
|
37.5th | 9.8 | This vulnerability allows attackers to include local files on the server through improper filename c | |
| 1776 | CVE-2025-67515 |
|
37.5th | 9.8 | This CVE describes a PHP Local File Inclusion vulnerability in the Wilmër WordPress theme by Mikado | |
| 1777 | CVE-2025-53912 |
|
37.6th | 9.6 | This vulnerability allows attackers to read arbitrary files on MedDream PACS Premium servers by send | |
| 1778 | CVE-2025-69258 |
|
37.5th | 9.8 | An unauthenticated remote attacker can exploit a LoadLibraryEX vulnerability in Trend Micro Apex Cen | |
| 1779 | CVE-2025-67920 |
|
37.5th | 9.8 | This vulnerability allows attackers to include local PHP files through improper filename control in | |
| 1780 | CVE-2025-22712 |
|
37.5th | 9.8 | This vulnerability allows attackers to include arbitrary local files through PHP's include/require s | |
| 1781 | CVE-2025-22708 |
|
37.5th | 9.8 | This vulnerability allows attackers to include local files on the server through improper filename c | |
| 1782 | CVE-2025-22707 |
|
37.5th | 9.8 | This vulnerability allows attackers to include arbitrary local files through PHP's include/require s | |
| 1783 | CVE-2025-22509 |
|
37.5th | 9.8 | This vulnerability allows attackers to include arbitrary local files through PHP's include/require s | |
| 1784 | CVE-2025-14431 |
|
37.5th | 9.8 | This vulnerability allows attackers to include local files on the server through improper filename c | |
| 1785 | CVE-2025-14430 |
|
37.5th | 9.8 | This CVE describes a PHP Local File Inclusion vulnerability in the Brook WordPress theme that allows | |
| 1786 | CVE-2025-14429 |
|
37.5th | 9.8 | This vulnerability allows attackers to include local PHP files through improper filename control in | |
| 1787 | CVE-2025-14359 |
|
37.5th | 9.8 | This vulnerability allows attackers to include local files on the server through improper filename c | |
| 1788 | CVE-2025-12550 |
|
37.5th | 9.8 | This CVE describes a PHP Local File Inclusion vulnerability in the OchaHouse WordPress theme that al | |
| 1789 | CVE-2025-12549 |
|
37.5th | 9.8 | This CVE describes a PHP Local File Inclusion vulnerability in the Rozy - Flower Shop WordPress them | |
| 1790 | CVE-2025-22146 |
|
37.5th | 9.1 | A critical SAML SSO vulnerability in Sentry allows attackers to take over any user account by using | |
| 1791 | CVE-2025-43234 |
|
37.5th | 9.8 | This CVE describes memory corruption vulnerabilities in Apple's graphics processing that could allow | |
| 1792 | CVE-2024-47856 |
|
37.5th | 9.8 | This vulnerability allows attackers to execute arbitrary code with SYSTEM privileges on Windows syst | |
| 1793 | CVE-2023-53923 |
|
37.5th | 9.8 | CVE-2023-53923 is a critical privilege escalation vulnerability in UliCMS that allows unauthenticate | |
| 1794 | CVE-2025-41742 |
|
37.5th | 9.8 | Sprecher Automations SPRECON-E devices use default cryptographic keys that allow unauthorized remote | |
| 1795 | CVE-2026-20418 |
|
37.4th | 9.8 | CVE-2026-20418 is a critical out-of-bounds write vulnerability in Thread protocol implementations th | |
| 1796 | CVE-2025-40736 |
|
37.3th | 9.8 | This critical vulnerability in SINEC NMS allows unauthenticated attackers to reset the superadmin pa | |
| 1797 | CVE-2025-48501 |
|
37.3th | 9.8 | This CVE describes an OS command injection vulnerability in Nimesa Backup and Recovery software vers | |
| 1798 | CVE-2025-26416 |
|
37.3th | 9.8 | This critical vulnerability in Android's Skia graphics library allows remote attackers to execute ar | |
| 1799 | CVE-2022-50591 |
|
37.3th | 9.8 | This vulnerability allows remote attackers to bypass authentication and execute SQL injection attack | |
| 1800 | CVE-2025-0066 |
|
37.2th | 9.9 | This critical vulnerability in SAP NetWeaver AS for ABAP and ABAP Platform's Internet Communication |
What is EPSS?
The Exploit Prediction Scoring System (EPSS) is a data-driven model developed by FIRST.org that estimates the probability a CVE will be exploited in the wild within the next 30 days. Unlike CVSS which measures severity, EPSS measures likelihood of exploitation — making it ideal for prioritizing which vulnerabilities to patch first.
Why EPSS matters: With thousands of CVEs published monthly, not all vulnerabilities are equally dangerous. EPSS helps security teams focus on the CVEs most likely to be actively exploited, rather than patching solely by CVSS score. A critical CVSS 9.8 vulnerability with 0.1% EPSS may be less urgent than a high CVSS 7.5 with 90% EPSS.
Prioritize by Exploit Risk
Scan your servers and see which vulnerabilities have the highest EPSS scores. Focus on what attackers are actually targeting.
Start Monitoring Free