Most Exploitable CVEs - EPSS Rankings
CVEs ranked by EPSS (Exploit Prediction Scoring System) probability. Higher scores mean a greater likelihood of exploitation in the wild within the next 30 days.
| Rank | CVE ID | EPSS Score | Percentile | CVSS | Flags | Summary |
|---|---|---|---|---|---|---|
| 1901 | CVE-2026-0792 |
|
71.1th | 9.8 | This vulnerability allows unauthenticated remote attackers to execute arbitrary code on ALGO 8180 IP | |
| 1902 | CVE-2026-0791 |
|
71.1th | 9.8 | This vulnerability allows remote attackers to execute arbitrary code on ALGO 8180 IP Audio Alerter d | |
| 1903 | CVE-2026-23524 |
|
71.1th | 9.8 | CVE-2026-23524 is a critical deserialization vulnerability in Laravel Reverb that allows remote code | |
| 1904 | CVE-2024-53834 |
|
71.1th | 7.5 | This vulnerability in Android's SMS utilities allows remote attackers to read memory beyond intended | |
| 1905 | CVE-2025-21376 |
|
71.1th | 8.1 | This vulnerability allows remote attackers to execute arbitrary code on Windows systems running vuln | |
| 1906 | CVE-2025-49836 |
|
71.1th | 9.8 | This CVE describes a command injection vulnerability in GPT-SoVITS-WebUI that allows attackers to ex | |
| 1907 | CVE-2025-49834 |
|
71.1th | 9.8 | This CVE describes a command injection vulnerability in GPT-SoVITS-WebUI that allows attackers to ex | |
| 1908 | CVE-2023-36419 |
|
71.1th | 8.8 | This vulnerability in Azure HDInsight's Apache Oozie workflow scheduler allows attackers to perform | |
| 1909 | CVE-2025-0390 |
|
71.1th | 5.3 | This critical path traversal vulnerability in Jeewms allows attackers to access arbitrary files on t | |
| 1910 | CVE-2025-12945 |
|
71.1th | 7.2 | This vulnerability allows authenticated administrators on NETGEAR Nighthawk R7000P routers to execut | |
| 1911 | CVE-2025-25200 |
|
71th | 7.5 | Koa middleware for Node.js versions prior to 0.21.2, 1.7.1, 2.15.4, and 3.0.0-alpha.3 contain a regu | |
| 1912 | CVE-2024-10636 |
|
71th | 6.1 | This vulnerability allows unauthenticated attackers to inject malicious scripts via the 'content' pa | |
| 1913 | CVE-2024-20153 |
|
71th | 7.5 | This vulnerability allows attackers to spoof Wi-Fi access point SSIDs, tricking client devices into | |
| 1914 | CVE-2024-12339 |
|
71th | 6.1 | The Digihood HTML Sitemap WordPress plugin contains a reflected cross-site scripting vulnerability i | |
| 1915 | CVE-2024-11376 |
|
71th | 6.1 | This vulnerability allows unauthenticated attackers to perform reflected cross-site scripting (XSS) | |
| 1916 | CVE-2025-25246 |
|
71th | 8.1 | This vulnerability allows unauthenticated remote attackers to execute arbitrary code on affected NET | |
| 1917 | CVE-2024-13497 |
|
71th | 7.2 | The Tripetto WordPress plugin (versions up to 8.0.9) has a stored XSS vulnerability in attachment up | |
| 1918 | CVE-2025-1561 |
|
71th | 7.2 | This vulnerability allows unauthenticated attackers to inject malicious JavaScript into WordPress pa | |
| 1919 | CVE-2024-13827 |
|
71th | 6.1 | This vulnerability allows unauthenticated attackers to inject malicious scripts into WordPress pages | |
| 1920 | CVE-2024-44373 |
|
71th | 9.8 | CVE-2024-44373 is a critical path traversal vulnerability in AllSky software that allows unauthentic | |
| 1921 | CVE-2025-3237 |
|
70.9th | 5.3 | This vulnerability in Tenda FH1202 routers allows attackers to bypass access controls via the /gofor | |
| 1922 | CVE-2024-12919 |
|
70.9th | 9.8 | This vulnerability allows unauthenticated attackers to bypass authentication in the Paid Membership | |
| 1923 | CVE-2025-3445 |
|
70.9th | 8.1 | A path traversal vulnerability in mholt/archiver Go library allows attackers to create or overwrite | |
| 1924 | CVE-2025-30014 |
|
70.9th | 7.7 | SAP Capital Yield Tax Management contains a directory traversal vulnerability (CWE-35) that allows a | |
| 1925 | CVE-2025-34506 |
|
70.9th | 8.8 | This vulnerability allows authenticated administrators in WBCE CMS to upload malicious ZIP modules c | |
| 1926 | CVE-2024-57684 |
|
70.9th | 9.8 | This vulnerability allows unauthenticated attackers to remotely configure the DMZ (Demilitarized Zon | |
| 1927 | CVE-2025-7721 |
|
70.8th | 9.8 | This vulnerability allows unauthenticated attackers to perform Local File Inclusion (LFI) in the Joo | |
| 1928 | CVE-2025-3155 |
|
70.8th | 7.4 | CVE-2025-3155 is a vulnerability in Yelp (the GNOME help application) that allows malicious help doc | |
| 1929 | CVE-2024-56366 |
|
70.8th | 5.4 | PhpSpreadsheet versions prior to 3.7.0, 2.3.5, 2.1.6, and 1.29.7 contain a reflected cross-site scri | |
| 1930 | CVE-2024-13182 |
|
70.8th | 9.8 | The WP Directorybox Manager WordPress plugin has an authentication bypass vulnerability that allows | |
| 1931 | CVE-2024-57451 |
|
70.8th | 7.5 | ChestnutCMS versions 1.5.0 and earlier contain a directory traversal vulnerability in the FileContro | |
| 1932 | CVE-2025-1515 |
|
70.8th | 9.8 | The WP Real Estate Manager WordPress plugin has an authentication bypass vulnerability that allows u | |
| 1933 | CVE-2025-4803 |
|
70.8th | 7.2 | This vulnerability allows authenticated WordPress administrators to perform PHP object injection via | |
| 1934 | CVE-2024-11187 |
|
70.8th | 7.5 | This CVE describes a resource exhaustion vulnerability in BIND DNS servers where specially crafted z | |
| 1935 | CVE-2025-23359 |
|
70.8th | 8.3 | CVE-2025-23359 is a Time-of-Check Time-of-Use (TOCTOU) vulnerability in NVIDIA Container Toolkit for | |
| 1936 | CVE-2025-28236 |
|
70.8th | 9.8 | This vulnerability allows remote attackers to execute arbitrary code on Nautel VX Series transmitter | |
| 1937 | CVE-2025-25053 |
|
70.8th | 8.8 | This CVE describes an OS command injection vulnerability in the WEB UI setting page of Wi-Fi AP UNIT | |
| 1938 | CVE-2025-6895 |
|
70.8th | 9.8 | The Melapress Login Security WordPress plugin versions 2.1.0 to 2.1.1 contain an authentication bypa | |
| 1939 | CVE-2025-67684 |
|
70.8th | 7.2 | Quick.Cart e-commerce software contains a Local File Inclusion and Path Traversal vulnerability in i | |
| 1940 | CVE-2024-13562 |
|
70.7th | 7.5 | The Import WP plugin for WordPress exposes sensitive data stored in the uploads directory to unauthe | |
| 1941 | CVE-2024-13434 |
|
70.7th | 6.1 | The WP Inventory Manager WordPress plugin up to version 2.3.2 contains a reflected cross-site script | |
| 1942 | CVE-2024-56248 |
|
70.7th | 4.9 | This path traversal vulnerability in the WPMasterToolKit WordPress plugin allows attackers to downlo | |
| 1943 | CVE-2025-3917 |
|
70.7th | 9.8 | This vulnerability allows unauthenticated attackers to upload arbitrary files to WordPress sites usi | |
| 1944 | CVE-2025-24366 |
|
70.7th | 7.5 | This vulnerability allows authenticated SFTPGo users to exploit unsanitized rsync command arguments | |
| 1945 | CVE-2025-57432 |
|
70.7th | 9.8 | Blackmagic Web Presenter version 3.3 exposes an unauthenticated Telnet service on port 9977, allowin | |
| 1946 | CVE-2025-15467 |
|
70.7th | 9.8 | This vulnerability allows attackers to trigger a stack buffer overflow by sending maliciously crafte | |
| 1947 | CVE-2025-2484 |
|
70.7th | 6.1 | The Multi Video Box WordPress plugin has a reflected cross-site scripting vulnerability in versions | |
| 1948 | CVE-2025-2164 |
|
70.7th | 6.1 | The pixelstats WordPress plugin contains a reflected cross-site scripting vulnerability in all versi | |
| 1949 | CVE-2025-2166 |
|
70.7th | 6.1 | This vulnerability allows unauthenticated attackers to execute reflected cross-site scripting (XSS) | |
| 1950 | CVE-2024-13413 |
|
70.7th | 6.1 | The ProductDyno WordPress plugin has a reflected cross-site scripting (XSS) vulnerability in all ver |
What is EPSS?
The Exploit Prediction Scoring System (EPSS) is a data-driven model developed by FIRST.org that estimates the probability a CVE will be exploited in the wild within the next 30 days. Unlike CVSS which measures severity, EPSS measures likelihood of exploitation — making it ideal for prioritizing which vulnerabilities to patch first.
Why EPSS matters: With thousands of CVEs published monthly, not all vulnerabilities are equally dangerous. EPSS helps security teams focus on the CVEs most likely to be actively exploited, rather than patching solely by CVSS score. A critical CVSS 9.8 vulnerability with 0.1% EPSS may be less urgent than a high CVSS 7.5 with 90% EPSS.
Prioritize by Exploit Risk
Scan your servers and see which vulnerabilities have the highest EPSS scores. Focus on what attackers are actually targeting.
Start Monitoring Free