Most Exploitable CVEs - EPSS Rankings
CVEs ranked by EPSS (Exploit Prediction Scoring System) probability. Higher scores mean a greater likelihood of exploitation in the wild within the next 30 days.
| Rank | CVE ID | EPSS Score | Percentile | CVSS | Flags | Summary |
|---|---|---|---|---|---|---|
| 1901 | CVE-2025-45841 |
|
35th | 9.8 | This vulnerability allows authenticated attackers to execute arbitrary code on TOTOLINK NR1800X rout | |
| 1902 | CVE-2025-46726 |
|
35th | 9.1 | Langroid applications using the XMLToolMessage class with untrusted XML input are vulnerable to XML | |
| 1903 | CVE-2025-46117 |
|
34.9th | 9.1 | This vulnerability allows authenticated attackers to execute arbitrary commands as root on Ruckus wi | |
| 1904 | CVE-2024-13241 |
|
34.7th | 9.1 | This CVE describes an Improper Authorization vulnerability in Drupal Open Social that allows attacke | |
| 1905 | CVE-2025-27528 |
|
34.8th | 9.1 | This vulnerability allows attackers to exploit insecure deserialization in Apache InLong's JDBC comp | |
| 1906 | CVE-2025-32975 |
|
34.7th | 10.0 | This CVE describes an authentication bypass vulnerability in Quest KACE Systems Management Appliance | |
| 1907 | CVE-2025-43347 |
|
34.7th | 9.8 | An input validation vulnerability in Apple operating systems allows attackers to execute arbitrary c | |
| 1908 | CVE-2025-11837 |
|
34.7th | 9.8 | This critical vulnerability in Malware Remover allows remote attackers to bypass security protection | |
| 1909 | CVE-2025-29922 |
|
34.7th | 9.6 | This vulnerability in kcp allows attackers to create or delete objects in any arbitrary target works | |
| 1910 | CVE-2025-43563 |
|
34.5th | 9.1 | This CVE describes an Improper Access Control vulnerability in Adobe ColdFusion that allows high-pri | |
| 1911 | CVE-2025-5120 |
|
34.7th | 10.0 | This CVE describes a critical sandbox escape vulnerability in huggingface/smolagents version 1.14.0 | |
| 1912 | CVE-2025-52239 |
|
34.4th | 9.8 | CVE-2025-52239 is an arbitrary file upload vulnerability in ZKEACMS v4.1 that allows attackers to up | |
| 1913 | CVE-2025-43220 |
|
34.4th | 9.8 | This vulnerability allows malicious applications to bypass symlink validation and access protected u | |
| 1914 | CVE-2025-11148 |
|
34.3th | 9.8 | CVE-2025-11148 is a critical command injection vulnerability in the check-branches npm package that | |
| 1915 | CVE-2024-9643 |
|
34.1th | 9.8 | The Four-Faith F3x36 router firmware v2.0.0 contains hard-coded administrative credentials, allowing | |
| 1916 | CVE-2025-9060 |
|
34.2th | 9.1 | This vulnerability in MSoft MFlash allows authenticated administrators to execute arbitrary code on | |
| 1917 | CVE-2025-35452 |
|
34.1th | 9.8 | This vulnerability allows attackers to access PTZOptics and other ValueHD-based pan-tilt-zoom camera | |
| 1918 | CVE-2025-13619 |
|
34.2th | 9.8 | The Flex Store Users WordPress plugin allows unauthenticated attackers to register accounts with adm | |
| 1919 | CVE-2025-12963 |
|
34.2th | 9.8 | The LazyTasks WordPress plugin has an unauthenticated privilege escalation vulnerability that allows | |
| 1920 | CVE-2025-13764 |
|
34.2th | 9.8 | The WP CarDealer WordPress plugin has a critical privilege escalation vulnerability that allows unau | |
| 1921 | CVE-2026-25632 |
|
34.1th | 10.0 | CVE-2026-25632 is a critical remote code execution vulnerability in EPyT-Flow's REST API. Attackers | |
| 1922 | CVE-2025-15018 |
|
34.2th | 9.8 | The Optional Email WordPress plugin contains a privilege escalation vulnerability that allows unauth | |
| 1923 | CVE-2023-27112 |
|
34th | 9.8 | This SQL injection vulnerability in pearProjectApi allows attackers to execute arbitrary SQL command | |
| 1924 | CVE-2024-40762 |
|
34th | 9.8 | This vulnerability in SonicOS SSLVPN uses a weak random number generator for authentication tokens, | |
| 1925 | CVE-2025-25349 |
|
34th | 9.8 | CVE-2025-25349 is a critical SQL injection vulnerability in PHPGurukul Daily Expense Tracker System | |
| 1926 | CVE-2026-1306 |
|
34th | 9.8 | The midi-Synth WordPress plugin allows unauthenticated attackers to upload arbitrary files due to mi | |
| 1927 | CVE-2025-26163 |
|
34th | 9.8 | CVE-2025-26163 is a critical SQL injection vulnerability in CM Soluces Informatica Ltda Auto Atendim | |
| 1928 | CVE-2025-41702 |
|
34th | 9.8 | This vulnerability allows unauthenticated remote attackers to generate valid JWT tokens using a hard | |
| 1929 | CVE-2025-57052 |
|
34.1th | 9.8 | cJSON versions 1.5.0 through 1.7.18 contain an out-of-bounds access vulnerability in the decode_arra | |
| 1930 | CVE-2025-34516 |
|
34th | 9.8 | Ilevia EVE X1 Server firmware versions up to 4.7.18.0.eden contain hardcoded default credentials tha | |
| 1931 | CVE-2025-66262 |
|
34.1th | 9.8 | This vulnerability allows attackers to overwrite arbitrary system files via path traversal in tar ar | |
| 1932 | CVE-2025-12158 |
|
34th | 9.8 | The Simple User Capabilities WordPress plugin has a critical privilege escalation vulnerability that | |
| 1933 | CVE-2026-23978 |
|
34th | 9.8 | This vulnerability allows attackers to include local files on the server through improper filename c | |
| 1934 | CVE-2024-13281 |
|
33.9th | 9.1 | This CVE describes an incorrect authorization vulnerability in Drupal's Monster Menus module that al | |
| 1935 | CVE-2024-13277 |
|
33.9th | 9.1 | This vulnerability allows attackers to bypass authorization controls in Drupal Smart IP Ban module, | |
| 1936 | CVE-2024-36556 |
|
33.9th | 9.1 | This CVE describes a hardcoded password vulnerability in Forever KidsWatch smartwatches. Attackers c | |
| 1937 | CVE-2025-39436 |
|
33.9th | 9.1 | This vulnerability allows attackers to upload malicious files to WordPress sites using the I Draw pl | |
| 1938 | CVE-2025-39356 |
|
33.8th | 9.8 | This vulnerability allows attackers to inject malicious objects through deserialization of untrusted | |
| 1939 | CVE-2025-39354 |
|
33.8th | 9.8 | This vulnerability allows attackers to inject malicious objects through deserialization of untrusted | |
| 1940 | CVE-2025-39349 |
|
33.8th | 9.8 | CVE-2025-39349 is a PHP object injection vulnerability in the CiyaShop WordPress theme that allows a | |
| 1941 | CVE-2025-32928 |
|
33.8th | 9.8 | This vulnerability in the ThemeGoods Altair WordPress theme allows attackers to inject malicious obj | |
| 1942 | CVE-2025-47581 |
|
33.8th | 9.8 | This vulnerability allows attackers to execute arbitrary code on WordPress sites by exploiting insec | |
| 1943 | CVE-2025-39410 |
|
33.8th | 9.8 | This vulnerability allows remote attackers to execute arbitrary PHP code through deserialization of | |
| 1944 | CVE-2025-30515 |
|
33.8th | 9.8 | CVE-2025-30515 is a path traversal vulnerability in CyberData 011209 Intercom systems that allows au | |
| 1945 | CVE-2025-7918 |
|
33.9th | 9.8 | CVE-2025-7918 is a critical SQL injection vulnerability in WinMatrix3 Web package that allows unauth | |
| 1946 | CVE-2025-52688 |
|
33.8th | 9.8 | This vulnerability allows remote attackers to execute arbitrary commands with root privileges on aff | |
| 1947 | CVE-2025-15047 |
|
33.9th | 9.8 | This vulnerability allows remote attackers to execute arbitrary code on Tenda WH450 routers by sendi | |
| 1948 | CVE-2025-15046 |
|
33.9th | 9.8 | This is a critical stack-based buffer overflow vulnerability in Tenda WH450 routers that allows remo | |
| 1949 | CVE-2025-15045 |
|
33.9th | 9.8 | A stack-based buffer overflow vulnerability in Tenda WH450 routers allows remote attackers to execut | |
| 1950 | CVE-2025-15044 |
|
33.9th | 9.8 | This vulnerability allows remote attackers to execute arbitrary code on Tenda WH450 routers by explo |
What is EPSS?
The Exploit Prediction Scoring System (EPSS) is a data-driven model developed by FIRST.org that estimates the probability a CVE will be exploited in the wild within the next 30 days. Unlike CVSS which measures severity, EPSS measures likelihood of exploitation — making it ideal for prioritizing which vulnerabilities to patch first.
Why EPSS matters: With thousands of CVEs published monthly, not all vulnerabilities are equally dangerous. EPSS helps security teams focus on the CVEs most likely to be actively exploited, rather than patching solely by CVSS score. A critical CVSS 9.8 vulnerability with 0.1% EPSS may be less urgent than a high CVSS 7.5 with 90% EPSS.
Prioritize by Exploit Risk
Scan your servers and see which vulnerabilities have the highest EPSS scores. Focus on what attackers are actually targeting.
Start Monitoring Free