Most Exploitable CVEs - EPSS Rankings
CVEs ranked by EPSS (Exploit Prediction Scoring System) probability. Higher scores mean a greater likelihood of exploitation in the wild within the next 30 days.
| Rank | CVE ID | EPSS Score | Percentile | CVSS | Flags | Summary |
|---|---|---|---|---|---|---|
| 1801 | CVE-2025-21352 |
|
72.1th | 6.5 | This vulnerability in Internet Connection Sharing (ICS) allows attackers to cause a denial of servic | |
| 1802 | CVE-2025-32577 |
|
72.1th | 9.8 | This vulnerability allows attackers to include local files on the server through PHP's include/requi | |
| 1803 | CVE-2025-22783 |
|
72.1th | 8.5 | This SQL injection vulnerability in the Squirrly SEO WordPress plugin allows attackers to execute ar | |
| 1804 | CVE-2025-0471 |
|
72.1th | 9.9 | An unrestricted file upload vulnerability in PMB platform versions 4.0.10 and above allows attackers | |
| 1805 | CVE-2025-59352 |
|
72.1th | 9.8 | This vulnerability in Dragonfly allows peers to create or read arbitrary files on other peers' syste | |
| 1806 | CVE-2025-20659 |
|
72.1th | 6.5 | This vulnerability in MediaTek modems allows remote denial of service through improper input validat | |
| 1807 | CVE-2024-13619 |
|
72.1th | 6.1 | This vulnerability in the LifterLMS WordPress plugin allows attackers to inject malicious scripts vi | |
| 1808 | CVE-2024-12724 |
|
72.1th | 6.1 | WP DeskLite WordPress plugin through version 1.0.0 contains a reflected cross-site scripting (XSS) v | |
| 1809 | CVE-2025-27540 |
|
72th | 9.8 | An unauthenticated SQL injection vulnerability in TeleControl Server Basic allows remote attackers t | |
| 1810 | CVE-2025-27495 |
|
72th | 9.8 | This critical SQL injection vulnerability in TeleControl Server Basic allows unauthenticated remote | |
| 1811 | CVE-2025-49630 |
|
72.1th | 7.5 | This vulnerability allows untrusted clients to trigger a denial of service attack against Apache HTT | |
| 1812 | CVE-2025-13698 |
|
72th | 4.5 | This vulnerability allows authenticated attackers on the same network to create arbitrary files on O | |
| 1813 | CVE-2025-45017 |
|
72th | 9.8 | A critical SQL injection vulnerability in PHPGurukul Park Ticketing Management System v2.0 allows re | |
| 1814 | CVE-2025-2996 |
|
72th | 5.3 | This vulnerability in Tenda FH1202 routers allows attackers to bypass access controls on the web man | |
| 1815 | CVE-2025-2991 |
|
72th | 5.3 | This critical vulnerability in Tenda FH1202 routers allows remote attackers to bypass access control | |
| 1816 | CVE-2025-30213 |
|
72th | 8.8 | This vulnerability in Frappe framework allows authenticated system users to create documents in a sp | |
| 1817 | CVE-2025-54385 |
|
72th | 9.8 | This CVE describes a critical SQL injection vulnerability in XWiki Platform that allows attackers to | |
| 1818 | CVE-2025-65878 |
|
72th | 7.5 | The warehouse management system version 1.2 contains an arbitrary file read vulnerability via direct | |
| 1819 | CVE-2025-6763 |
|
72th | 8.1 | This CVE describes an authentication bypass vulnerability in Comet System's web-based management int | |
| 1820 | CVE-2026-1735 |
|
72th | 4.3 | This CVE describes a command injection vulnerability in Yealink MeetingBar A30's Diagnostic Handler | |
| 1821 | CVE-2025-28407 |
|
71.9th | 8.8 | This vulnerability in RUoYi v4.8.0 allows remote attackers to escalate privileges by exploiting impr | |
| 1822 | CVE-2025-54122 |
|
71.9th | 10.0 | An unauthenticated Server-Side Request Forgery (SSRF) vulnerability in Manager accounting software a | |
| 1823 | CVE-2024-37917 |
|
71.9th | 7.5 | CVE-2024-37917 is an improper input validation vulnerability in Pexip Infinity video conferencing so | |
| 1824 | CVE-2025-3028 |
|
71.9th | 6.5 | This vulnerability allows JavaScript code to trigger a use-after-free condition during XSLT document | |
| 1825 | CVE-2025-31499 |
|
71.9th | 8.8 | This vulnerability allows argument injection in Jellyfin's FFmpeg processing, which can lead to arbi | |
| 1826 | CVE-2025-34278 |
|
71.9th | 5.4 | Nagios Network Analyzer versions before 2024R1 contain a stored XSS vulnerability in the Source Grou | |
| 1827 | CVE-2011-10037 |
|
71.9th | 5.4 | This cross-site scripting vulnerability in Nagios XI allows attackers to inject malicious scripts in | |
| 1828 | CVE-2025-3610 |
|
71.9th | 8.8 | The Reales WP STPT WordPress plugin allows authenticated attackers with subscriber-level access to c | |
| 1829 | CVE-2025-21344 |
|
71.8th | 7.8 | This vulnerability allows remote attackers to execute arbitrary code on Microsoft SharePoint Server | |
| 1830 | CVE-2025-1475 |
|
71.8th | 9.8 | The WPCOM Member WordPress plugin has an authentication bypass vulnerability that allows unauthentic | |
| 1831 | CVE-2025-7401 |
|
71.8th | 9.8 | This vulnerability in the Premium Age Verification WordPress plugin allows unauthenticated attackers | |
| 1832 | CVE-2025-32711 |
|
71.8th | 9.3 | This CVE describes an AI command injection vulnerability in Microsoft 365 Copilot that allows unauth | |
| 1833 | CVE-2024-58294 |
|
71.8th | 8.8 | FreePBX 16 contains an authenticated remote code execution vulnerability in the API module. Attacker | |
| 1834 | CVE-2024-58287 |
|
71.8th | 8.8 | CVE-2024-58287 is an authenticated command injection vulnerability in reNgine 2.2.0 that allows atta | |
| 1835 | CVE-2025-25784 |
|
71.7th | 9.8 | An arbitrary file upload vulnerability in Jizhicms v2.5.4 allows attackers to upload malicious Zip f | |
| 1836 | CVE-2025-58748 |
|
71.7th | 9.8 | This vulnerability allows remote code execution in Dataease by exploiting improper JDBC URL validati | |
| 1837 | CVE-2026-0766 |
|
71.7th | 8.8 | This vulnerability allows authenticated remote attackers to execute arbitrary Python code on Open We | |
| 1838 | CVE-2026-0765 |
|
71.7th | 8.8 | This vulnerability allows authenticated remote attackers to execute arbitrary system commands on Ope | |
| 1839 | CVE-2025-23196 |
|
71.7th | 8.8 | This CVE describes a code injection vulnerability in Apache Ambari's Alert Definition feature where | |
| 1840 | CVE-2024-8769 |
|
71.7th | 9.1 | This vulnerability allows attackers to delete arbitrary files on systems running the aimhubio/aim tr | |
| 1841 | CVE-2025-3836 |
|
71.7th | 8.3 | This vulnerability allows authenticated attackers to execute arbitrary SQL commands through the logo | |
| 1842 | CVE-2025-25387 |
|
71.6th | 7.2 | This SQL injection vulnerability in PHPGurukul Land Record System v1.0 allows remote attackers to ex | |
| 1843 | CVE-2025-25357 |
|
71.6th | 7.2 | A SQL injection vulnerability in PHPGurukul Land Record System v1.0 allows remote attackers to execu | |
| 1844 | CVE-2025-25356 |
|
71.6th | 7.2 | A SQL injection vulnerability in PHPGurukul Land Record System v1.0 allows remote attackers to execu | |
| 1845 | CVE-2025-25355 |
|
71.6th | 7.2 | A SQL injection vulnerability in PHPGurukul Land Record System v1.0 allows remote attackers to execu | |
| 1846 | CVE-2025-25354 |
|
71.6th | 7.2 | This SQL injection vulnerability in PHPGurukul Land Record System v1.0 allows remote attackers to ex | |
| 1847 | CVE-2025-25352 |
|
71.6th | 7.2 | This SQL injection vulnerability in PHPGurukul Land Record System v1.0 allows remote attackers to ex | |
| 1848 | CVE-2025-32137 |
|
71.6th | 4.9 | This CVE describes a relative path traversal vulnerability in the s2Member WordPress plugin that all | |
| 1849 | CVE-2025-1265 |
|
71.6th | 9.9 | An OS command injection vulnerability in Vinci Protocol Analyzer allows attackers to execute arbitra | |
| 1850 | CVE-2024-13681 |
|
71.6th | 7.5 | The Uncode WordPress theme contains an arbitrary file read vulnerability that allows unauthenticated |
What is EPSS?
The Exploit Prediction Scoring System (EPSS) is a data-driven model developed by FIRST.org that estimates the probability a CVE will be exploited in the wild within the next 30 days. Unlike CVSS which measures severity, EPSS measures likelihood of exploitation — making it ideal for prioritizing which vulnerabilities to patch first.
Why EPSS matters: With thousands of CVEs published monthly, not all vulnerabilities are equally dangerous. EPSS helps security teams focus on the CVEs most likely to be actively exploited, rather than patching solely by CVSS score. A critical CVSS 9.8 vulnerability with 0.1% EPSS may be less urgent than a high CVSS 7.5 with 90% EPSS.
Prioritize by Exploit Risk
Scan your servers and see which vulnerabilities have the highest EPSS scores. Focus on what attackers are actually targeting.
Start Monitoring Free