Most Exploitable CVEs - EPSS Rankings
CVEs ranked by EPSS (Exploit Prediction Scoring System) probability. Higher scores mean a greater likelihood of exploitation in the wild within the next 30 days.
| Rank | CVE ID | EPSS Score | Percentile | CVSS | Flags | Summary |
|---|---|---|---|---|---|---|
| 1901 | CVE-2025-12978 |
|
36th | 5.4 | Fluent Bit's in_http, in_splunk, and in_elasticsearch input plugins have a tag validation flaw where | |
| 1902 | CVE-2026-2218 |
|
36th | 6.3 | This CVE describes a command injection vulnerability in D-Link DCS-933L IP cameras through the /setS | |
| 1903 | CVE-2025-0696 |
|
35.9th | 5.3 | CVE-2025-0696 is a NULL pointer dereference vulnerability in Cesanta Frozen JSON parsing library ver | |
| 1904 | CVE-2024-33298 |
|
35.9th | 6.1 | Microweber v2.0.9 contains a cross-site scripting (XSS) vulnerability in the backup creation functio | |
| 1905 | CVE-2025-0235 |
|
35.9th | 5.3 | This vulnerability allows attackers to execute arbitrary code or cause denial of service by exploiti | |
| 1906 | CVE-2025-24607 |
|
35.9th | 5.8 | This CVE describes a Missing Authorization vulnerability in the IdeaPush WordPress plugin that allow | |
| 1907 | CVE-2025-0445 |
|
35.9th | 5.4 | This vulnerability is a use-after-free memory corruption flaw in Chrome's V8 JavaScript engine that | |
| 1908 | CVE-2024-9107 |
|
35.9th | 5.4 | A stored cross-site scripting (XSS) vulnerability in the gaizhenbiao/chuanhuchatgpt repository allow | |
| 1909 | CVE-2024-13901 |
|
35.9th | 4.4 | This vulnerability allows authenticated attackers with administrator-level access to inject maliciou | |
| 1910 | CVE-2025-0618 |
|
36th | 6.5 | This vulnerability allows a malicious actor to cause a persistent denial of service in FireEye EDR a | |
| 1911 | CVE-2025-3474 |
|
35.9th | 6.5 | This CVE describes a missing authentication vulnerability in Drupal Panels that allows attackers to | |
| 1912 | CVE-2024-6690 |
|
35.9th | 6.1 | The wccp-pro WordPress plugin before version 15.3 contains an open redirect vulnerability via the re | |
| 1913 | CVE-2023-6541 |
|
36th | 6.1 | The Allow SVG WordPress plugin before version 1.2.0 fails to sanitize uploaded SVG files, allowing u | |
| 1914 | CVE-2025-31239 |
|
35.9th | 4.3 | A use-after-free vulnerability in Apple operating systems allows parsing malicious files to cause un | |
| 1915 | CVE-2025-4329 |
|
35.9th | 4.3 | This vulnerability in 74CMS allows attackers to perform path traversal attacks by manipulating the ' | |
| 1916 | CVE-2025-4779 |
|
36th | 6.1 | This stored XSS vulnerability in lunary-ai/lunary allows unauthenticated attackers to inject malicio | |
| 1917 | CVE-2025-30261 |
|
36th | 6.5 | This vulnerability in Qsync Central allows authenticated remote attackers to perform resource exhaus | |
| 1918 | CVE-2025-29900 |
|
36th | 6.5 | This vulnerability in QNAP File Station 5 allows authenticated attackers to exhaust system resources | |
| 1919 | CVE-2025-29898 |
|
36th | 6.5 | An uncontrolled resource consumption vulnerability in Qsync Central allows authenticated remote atta | |
| 1920 | CVE-2025-10472 |
|
35.9th | 5.3 | A path traversal vulnerability in MoneyPrinterTurbo allows attackers to access arbitrary files on th | |
| 1921 | CVE-2025-15106 |
|
35.9th | 6.3 | CVE-2025-15106 is an improper authorization vulnerability in getmaxun maxun's authentication endpoin | |
| 1922 | CVE-2025-63372 |
|
35.9th | 4.3 | Articentgroup Zip Rar Extractor Tool 1.345.93.0 contains a directory traversal vulnerability in its | |
| 1923 | CVE-2025-0662 |
|
35.8th | 4.9 | CVE-2025-0662 is a kernel memory leak vulnerability in FreeBSD's ktrace facility that allows unprivi | |
| 1924 | CVE-2025-22608 |
|
35.7th | 6.5 | Coolify versions before 4.0.0-beta.361 have an authorization flaw where any authenticated user can r | |
| 1925 | CVE-2025-24427 |
|
35.8th | 6.5 | CVE-2025-24427 is an improper access control vulnerability in Adobe Commerce that allows low-privile | |
| 1926 | CVE-2024-57004 |
|
35.7th | 6.1 | This Cross-Site Scripting (XSS) vulnerability in Roundcube Webmail allows authenticated users to upl | |
| 1927 | CVE-2025-22066 |
|
35.8th | 5.5 | This CVE describes a NULL pointer dereference vulnerability in the Linux kernel's ASoC imx-card driv | |
| 1928 | CVE-2025-3388 |
|
35.7th | 4.3 | This vulnerability allows attackers to inject malicious scripts through the username parameter durin | |
| 1929 | CVE-2025-3256 |
|
35.9th | 6.3 | This vulnerability in admintwo 1.0 allows attackers to bypass access controls via the email paramete | |
| 1930 | CVE-2025-28132 |
|
35.8th | 4.6 | A session management vulnerability in Nagios Network Analyzer allows attackers to reuse session toke | |
| 1931 | CVE-2025-2906 |
|
35.8th | 6.4 | The Contempo Real Estate Core WordPress plugin has a stored XSS vulnerability that allows authentica | |
| 1932 | CVE-2025-33004 |
|
35.9th | 6.5 | This vulnerability in IBM Planning Analytics Local allows privileged users to delete files from dire | |
| 1933 | CVE-2025-41677 |
|
35.8th | 4.9 | This vulnerability allows a high-privileged remote attacker to cause denial of service by exhausting | |
| 1934 | CVE-2025-47999 |
|
35.7th | 6.8 | A missing synchronization vulnerability in Windows Hyper-V allows an authenticated attacker on an ad | |
| 1935 | CVE-2025-55673 |
|
35.8th | 4.3 | This vulnerability allows guest users in Apache Superset to access database schema information throu | |
| 1936 | CVE-2025-59535 |
|
35.8th | 6.5 | DNN CMS versions before 10.1.0 allow attackers to load arbitrary themes via query parameters, potent | |
| 1937 | CVE-2025-59790 |
|
35.8th | 5.4 | CVE-2025-59790 is an improper privilege management vulnerability in Apache Kvrocks that could allow | |
| 1938 | CVE-2025-49088 |
|
35.8th | 5.9 | This vulnerability in Pexip Infinity's OTJ service allows remote attackers to cause denial of servic | |
| 1939 | CVE-2025-24628 |
|
35.6th | 5.3 | This vulnerability allows attackers to bypass CAPTCHA verification in the BestWebSoft Google Captcha | |
| 1940 | CVE-2025-26960 |
|
35.6th | 6.5 | This CVE describes a Missing Authorization vulnerability in the Small Package Quotes – Unishippers | |
| 1941 | CVE-2025-24567 |
|
35.6th | 6.5 | This vulnerability in WP Mailster WordPress plugin exposes sensitive embedded data in sent emails. A | |
| 1942 | CVE-2025-23766 |
|
35.6th | 6.5 | This CVE describes a Missing Authorization vulnerability in the OPSI Israel Domestic Shipments WordP | |
| 1943 | CVE-2025-22730 |
|
35.6th | 6.5 | This CVE describes a missing authorization vulnerability in the Ksher WordPress payment plugin that | |
| 1944 | CVE-2025-24697 |
|
35.6th | 6.5 | This CVE describes a missing authorization vulnerability in the Realwebcare Image Gallery WordPress | |
| 1945 | CVE-2025-24643 |
|
35.6th | 6.5 | This CVE describes a Missing Authorization vulnerability in WPGuppy WordPress plugin that allows att | |
| 1946 | CVE-2025-24639 |
|
35.6th | 6.5 | This vulnerability in GREYS Korea for WooCommerce WordPress plugin exposes sensitive embedded data t | |
| 1947 | CVE-2025-1508 |
|
35.6th | 5.3 | The WP Crowdfunding WordPress plugin has an authorization vulnerability that allows authenticated us | |
| 1948 | CVE-2025-0660 |
|
35.6th | 4.8 | Concrete CMS versions 9.0.0 through 9.3.9 contain a stored cross-site scripting (XSS) vulnerability | |
| 1949 | CVE-2025-30694 |
|
35.6th | 5.4 | This vulnerability in Oracle Database's XML Database component allows authenticated attackers with n | |
| 1950 | CVE-2025-32073 |
|
35.7th | 5.4 | This CVE describes an improper input validation vulnerability in MediaWiki's HTML Tags extension tha |
What is EPSS?
The Exploit Prediction Scoring System (EPSS) is a data-driven model developed by FIRST.org that estimates the probability a CVE will be exploited in the wild within the next 30 days. Unlike CVSS which measures severity, EPSS measures likelihood of exploitation — making it ideal for prioritizing which vulnerabilities to patch first.
Why EPSS matters: With thousands of CVEs published monthly, not all vulnerabilities are equally dangerous. EPSS helps security teams focus on the CVEs most likely to be actively exploited, rather than patching solely by CVSS score. A critical CVSS 9.8 vulnerability with 0.1% EPSS may be less urgent than a high CVSS 7.5 with 90% EPSS.
Prioritize by Exploit Risk
Scan your servers and see which vulnerabilities have the highest EPSS scores. Focus on what attackers are actually targeting.
Start Monitoring Free