Most Exploitable CVEs - EPSS Rankings

CVEs ranked by EPSS (Exploit Prediction Scoring System) probability. Higher scores mean a greater likelihood of exploitation in the wild within the next 30 days.

164
EPSS > 50%
156
CISA KEV Listed
35,468
CVEs with EPSS
0.7%
Avg EPSS Score
All Critical High Medium Low
Rank CVE ID EPSS Score Percentile CVSS Flags Summary
1851 CVE-2025-29312
0.15%
35.8th 9.1 This vulnerability in ONOS (Open Network Operating System) v2.7.0 allows attackers to trigger unexpe
1852 CVE-2025-12057
0.15%
35.8th 9.8 The WavePlayer WordPress plugin before version 3.8.0 contains an unauthenticated arbitrary file uplo
1853 CVE-2025-56385
0.15%
35.8th 9.8 This SQL injection vulnerability in WellSky Harmony's login functionality allows attackers to bypass
1854 CVE-2026-24531
0.15%
35.8th 9.8 This vulnerability allows attackers to include local files on the server through improper filename c
1855 CVE-2026-1364
0.15%
35.8th 9.8 CVE-2026-1364 is a critical missing authentication vulnerability in IAQS and I6 systems developed by
1856 CVE-2026-23975
0.15%
35.8th 9.8 This CVE describes a PHP Local File Inclusion vulnerability in the Golo WordPress theme that allows
1857 CVE-2025-54003
0.15%
35.8th 9.8 This vulnerability allows attackers to include local PHP files through improper filename control in
1858 CVE-2025-50003
0.15%
35.8th 9.8 This vulnerability allows attackers to include local PHP files through improper filename control in
1859 CVE-2025-49994
0.15%
35.8th 9.8 This vulnerability allows attackers to include local files on the server through improper filename c
1860 CVE-2025-47474
0.15%
35.8th 9.8 This vulnerability allows attackers to include local PHP files through improper filename control in
1861 CVE-2025-27663
0.15%
35.6th 9.8 CVE-2025-27663 is a critical authentication vulnerability in Vasion Print (formerly PrinterLogic) th
1862 CVE-2025-49827
0.15%
35.6th 9.8 This vulnerability allows attackers to bypass IAM authentication in Conjur by manipulating AWS-signe
1863 CVE-2025-60724
0.15%
35.6th 9.8 A heap-based buffer overflow vulnerability in Microsoft Graphics Component allows remote attackers t
1864 CVE-2025-66489
0.15%
35.5th 9.8 This vulnerability in Cal.com scheduling software allows attackers to bypass password verification w
1865 CVE-2025-40765
0.15%
35.5th 9.8 An information disclosure vulnerability in TeleControl Server Basic V3.1 allows unauthenticated remo
1866 CVE-2025-65112
0.15%
35.5th 9.4 PubNet versions before 1.1.3 allow unauthenticated attackers to upload packages as any user by manip
1867 CVE-2025-68929
0.15%
35.5th 9.0 This vulnerability allows authenticated Frappe users with specific permissions to be tricked into cl
1868 CVE-2026-25722
0.15%
35.5th 9.1 CVE-2026-25722 is a directory traversal vulnerability in Claude Code that allows attackers to bypass
1869 CVE-2025-30139
0.15%
35.4th 9.8 G-Net Dashcam BB GONX devices have hardcoded default Wi-Fi credentials that cannot be changed, allow
1870 CVE-2025-32431
0.15%
35.3th 9.1 Traefik reverse proxy versions before 2.11.24, 3.3.6, and 3.4.0-rc2 contain a path traversal vulnera
1871 CVE-2025-40906
0.15%
35.4th 9.8 CVE-2025-40906 affects BSON::XS versions 0.8.4 and earlier for Perl, which bundle a vulnerable libbs
1872 CVE-2024-57190
0.15%
35.4th 9.8 CVE-2024-57190 is an authentication bypass vulnerability in Erxes that allows attackers to impersona
1873 CVE-2025-10725
0.15%
35.3th 9.9 A privilege escalation vulnerability in Red Hat OpenShift AI Service allows authenticated low-privil
1874 CVE-2025-66456
0.15%
35.3th 9.8 This CVE describes a prototype pollution vulnerability in the Elysia TypeScript framework that, when
1875 CVE-2025-57529
0.15%
35.3th 9.8 CVE-2025-57529 is a critical SQL injection vulnerability in YouDataSum CPAS Audit Management System
1876 CVE-2025-54952
0.15%
35.3th 9.8 An integer overflow vulnerability in ExecuTorch model loading causes insufficient memory allocation,
1877 CVE-2025-13540
0.15%
35.1th 9.8 The Tiare Membership WordPress plugin has a privilege escalation vulnerability that allows unauthent
1878 CVE-2025-13538
0.15%
35.1th 9.8 The FindAll Listing plugin for WordPress has a privilege escalation vulnerability that allows unauth
1879 CVE-2025-13559
0.15%
35.1th 9.8 The EduKart Pro WordPress plugin allows unauthenticated attackers to register accounts with administ
1880 CVE-2025-11127
0.15%
35.1th 9.8 This vulnerability allows unauthenticated attackers to hijack user sessions in Mstoreapp WordPress p
1881 CVE-2025-11457
0.15%
35.1th 9.8 This vulnerability allows unauthenticated attackers to register as administrators on WordPress sites
1882 CVE-2025-8900
0.15%
35.1th 9.8 The Doccure Core WordPress plugin allows unauthenticated attackers to create accounts with administr
1883 CVE-2025-13542
0.15%
35.1th 9.8 The DesignThemes LMS WordPress plugin allows unauthenticated attackers to register accounts with adm
1884 CVE-2025-59695
0.15%
35.3th 9.8 This vulnerability allows users with root access to the operating system to modify firmware on the C
1885 CVE-2026-22686
0.15%
35.2th 10.0 CVE-2026-22686 is a critical sandbox escape vulnerability in enclave-vm that allows untrusted JavaSc
1886 CVE-2024-23943
0.15%
35th 9.1 An unauthenticated remote attacker can exploit this vulnerability to gain unauthorized access to the
1887 CVE-2025-44897
0.15%
35.1th 9.8 This vulnerability allows remote attackers to execute arbitrary code on affected FW-WGS-804HPT devic
1888 CVE-2025-44894
0.15%
35.1th 9.8 This vulnerability allows remote attackers to execute arbitrary code on affected FW-WGS-804HPT devic
1889 CVE-2025-44883
0.15%
35.1th 9.8 This vulnerability allows remote attackers to execute arbitrary code on affected FW-WGS-804HPT devic
1890 CVE-2025-44890
0.15%
35.1th 9.8 This vulnerability allows remote attackers to execute arbitrary code on affected FW-WGS-804HPT devic
1891 CVE-2025-44887
0.15%
35.1th 9.8 This vulnerability allows remote attackers to execute arbitrary code on affected FW-WGS-804HPT devic
1892 CVE-2025-44885
0.15%
35.1th 9.8 This vulnerability allows remote attackers to execute arbitrary code on affected FW-WGS-804HPT devic
1893 CVE-2025-45513
0.15%
35.1th 9.8 Tenda FH451 router firmware version V1.0.0.9 contains a stack overflow vulnerability in the P2pListF
1894 CVE-2025-26074
0.15%
35.1th 9.8 CVE-2025-26074 is a critical remote code execution vulnerability in Orkes Conductor that allows atta
1895 CVE-2025-43186
0.15%
35.1th 9.8 This is a critical memory corruption vulnerability in Apple's file parsing components across multipl
1896 CVE-2025-48293
0.15%
35.1th 9.8 This vulnerability allows attackers to include local files on the server through improper filename c
1897 CVE-2025-25174
0.15%
35.1th 10.0 This CVE describes a PHP Local File Inclusion vulnerability in the BeeTeam368 Extensions WordPress p
1898 CVE-2025-50692
0.15%
35.1th 9.8 FoxCMS versions up to 1.2.5 contain a code injection vulnerability in the admin template file editor
1899 CVE-2025-25379
0.15%
34.9th 9.6 A Cross-Site Request Forgery (CSRF) vulnerability in 07FLYCMS v1.3.9 allows remote attackers to tric
1900 CVE-2025-24964
0.15%
35th 9.6 This vulnerability allows remote attackers to execute arbitrary code on systems running Vitest with

What is EPSS?

The Exploit Prediction Scoring System (EPSS) is a data-driven model developed by FIRST.org that estimates the probability a CVE will be exploited in the wild within the next 30 days. Unlike CVSS which measures severity, EPSS measures likelihood of exploitation — making it ideal for prioritizing which vulnerabilities to patch first.

Why EPSS matters: With thousands of CVEs published monthly, not all vulnerabilities are equally dangerous. EPSS helps security teams focus on the CVEs most likely to be actively exploited, rather than patching solely by CVSS score. A critical CVSS 9.8 vulnerability with 0.1% EPSS may be less urgent than a high CVSS 7.5 with 90% EPSS.

Prioritize by Exploit Risk

Scan your servers and see which vulnerabilities have the highest EPSS scores. Focus on what attackers are actually targeting.

Start Monitoring Free