Most Exploitable CVEs - EPSS Rankings

CVEs ranked by EPSS (Exploit Prediction Scoring System) probability. Higher scores mean a greater likelihood of exploitation in the wild within the next 30 days.

164
EPSS > 50%
156
CISA KEV Listed
35,468
CVEs with EPSS
0.7%
Avg EPSS Score
All Critical High Medium Low
Rank CVE ID EPSS Score Percentile CVSS Flags Summary
151 CVE-2025-22964
13.92%
94.1th 8.1 This vulnerability allows unauthenticated attackers to perform time-based blind SQL injection attack
152 CVE-2024-12365
13.77%
94.1th 8.5 The W3 Total Cache WordPress plugin up to version 2.8.1 lacks proper capability checks, allowing aut
153 CVE-2026-21509
13.43%
94th 7.8 KEV This vulnerability in Microsoft Office allows an attacker to bypass local security features by manip
154 CVE-2024-12085
13.04%
93.9th 7.5 This vulnerability in rsync allows attackers to leak uninitialized stack memory one byte at a time b
155 CVE-2024-40890
13.04%
93.9th 8.8 KEV This is a post-authentication command injection vulnerability in Zyxel VMG4325-B10A DSL CPE devices
156 CVE-2025-3935
12.3%
93.7th 8.1 KEV CVE-2025-3935 is a ViewState code injection vulnerability affecting ScreenConnect versions 25.2.3 an
157 CVE-2024-48419
11.34%
93.4th 8.8 This CVE describes multiple command injection vulnerabilities in Edimax AC1200 routers that allow au
158 CVE-2025-49716
11.16%
93.3th 7.5 This vulnerability in Windows Netlogon allows unauthorized attackers to cause denial of service by c
159 CVE-2025-7795
10.93%
93.2th 8.8 A critical stack-based buffer overflow vulnerability in Tenda FH451 routers allows remote attackers
160 CVE-2025-31131
10.79%
93.2th 8.6 YesWiki versions before 4.5.2 contain a path traversal vulnerability in the squelette parameter that
161 CVE-2024-55968
10.72%
93.2th 8.8 This vulnerability allows unauthorized local attackers to escalate privileges to root on macOS syste
162 CVE-2025-53558
10.71%
93.2th 8.8 ZTE Japan's ZXHN-F660T and ZXHN-F660A routers use a hardcoded credential shared across all installat
163 CVE-2025-21380
10.63%
93.1th 8.8 This vulnerability allows authenticated attackers to bypass access controls in Azure SaaS Resources,
164 CVE-2025-26264
10.53%
93.1th 8.8 GeoVision GV-ASWeb versions 6.1.2.0 and below contain an authenticated remote code execution vulnera
165 CVE-2025-66744
10.48%
93.1th 7.5 This vulnerability in Yonyou YonBIP allows attackers to bypass normal directory restrictions via pat
166 CVE-2025-32724
10.43%
93.1th 7.5 This vulnerability allows an unauthorized attacker to cause a denial of service (DoS) in Windows LSA
167 CVE-2025-23369
9.97%
92.9th 8.8 This vulnerability allows unauthorized internal users to spoof cryptographic signatures in GitHub En
168 CVE-2025-21343
9.88%
92.8th 7.5 This vulnerability in Windows Web Threat Defense User Service allows attackers to read sensitive inf
169 CVE-2025-33068
9.71%
92.7th 7.5 This vulnerability in Windows Standards-Based Storage Management Service allows unauthorized attacke
170 CVE-2025-1639
9.64%
92.7th 8.8 The Animation Addons for Elementor Pro WordPress plugin has a vulnerability that allows authenticate
171 CVE-2025-53722
9.54%
92.7th 7.5 This vulnerability allows an unauthorized attacker to cause a denial-of-service condition in Windows
172 CVE-2024-20150
9.34%
92.6th 7.5 This vulnerability in MediaTek modem firmware allows remote attackers to cause a system crash (denia
173 CVE-2025-6770
9.17%
92.5th 7.2 CVE-2025-6770 is an OS command injection vulnerability in Ivanti Endpoint Manager Mobile (EPMM) that
174 CVE-2024-23733
9.17%
92.5th 7.5 This vulnerability allows remote attackers to bypass authentication on Software AG webMethods Integr
175 CVE-2025-6204
8.82%
92.3th 8.0 KEV This CVE describes a code injection vulnerability in DELMIA Apriso manufacturing software that allow
176 CVE-2024-56289
8.51%
92.2th 7.1 This is a reflected cross-site scripting (XSS) vulnerability in the Groundhogg WordPress plugin that
177 CVE-2025-21418
8.43%
92.1th 7.8 KEV This vulnerability in Windows Ancillary Function Driver for WinSock allows attackers to gain SYSTEM-
178 CVE-2024-57539
8.35%
92.1th 8.2 This CVE describes a command injection vulnerability in Linksys E8450 routers where an attacker can
179 CVE-2024-53345
8.3%
92.1th 8.8 An authenticated arbitrary file upload vulnerability in Car Rental Management System versions 1.0 th
180 CVE-2025-36845
8.13%
92th 8.6 This Server-Side Request Forgery (SSRF) vulnerability in Eveo URVE Web Manager allows attackers to m
181 CVE-2025-26633
8.06%
91.9th 7.0 KEV CVE-2025-26633 is a security feature bypass vulnerability in Microsoft Management Console (MMC) that
182 CVE-2025-27134
8.06%
91.9th 8.8 This privilege escalation vulnerability in Joplin server allows non-admin users to modify their own
183 CVE-2025-2473
8.03%
91.9th 7.3 This critical SQL injection vulnerability in PHPGurukul Company Visitor Management System 2.0 allows
184 CVE-2025-8876
7.85%
91.8th 8.8 KEV CVE-2025-8876 is an OS command injection vulnerability in N-able N-central management software cause
185 CVE-2025-56132
7.83%
91.8th 7.3 LiquidFiles filetransfer server versions prior to 4.2 have a user enumeration vulnerability in the p
186 CVE-2025-30355
7.54%
91.6th 7.1 A malicious Matrix server can craft events that cause Synapse homeservers to stop federating with ot
187 CVE-2025-44177
7.54%
91.6th 8.2 An unauthenticated directory traversal vulnerability in White Star Software Protop version 4.4.2-202
188 CVE-2025-21204
7.33%
91.5th 7.8 This vulnerability allows an authorized attacker with local access to exploit improper link resoluti
189 CVE-2025-21173
7.33%
91.5th 7.3 This CVE describes a privilege escalation vulnerability in .NET that allows authenticated attackers
190 CVE-2024-57022
6.95%
91.2th 8.8 This vulnerability allows remote attackers to execute arbitrary operating system commands on TOTOLIN
191 CVE-2024-57021
6.95%
91.2th 8.8 This vulnerability allows remote attackers to execute arbitrary operating system commands on TOTOLIN
192 CVE-2024-57020
6.95%
91.2th 8.8 This vulnerability allows remote attackers to execute arbitrary operating system commands on TOTOLIN
193 CVE-2024-57019
6.95%
91.2th 8.8 This vulnerability allows remote attackers to execute arbitrary operating system commands on TOTOLIN
194 CVE-2024-57018
6.95%
91.2th 8.8 This vulnerability allows remote attackers to execute arbitrary operating system commands on TOTOLIN
195 CVE-2024-57017
6.95%
91.2th 8.8 This vulnerability allows remote attackers to execute arbitrary operating system commands on TOTOLIN
196 CVE-2024-57016
6.95%
91.2th 8.8 This CVE describes an OS command injection vulnerability in TOTOLINK X5000R routers where an attacke
197 CVE-2024-57015
6.95%
91.2th 8.8 This CVE describes an OS command injection vulnerability in TOTOLINK X5000R routers where attackers
198 CVE-2024-57013
6.95%
91.2th 8.8 This CVE describes an OS command injection vulnerability in TOTOLINK X5000R routers where attackers
199 CVE-2024-57012
6.95%
91.2th 8.8 This vulnerability allows remote attackers to execute arbitrary operating system commands on TOTOLIN
200 CVE-2025-25231
6.81%
91.1th 7.5 Omnissa Workspace ONE UEM contains a path traversal vulnerability in secondary context paths that al

What is EPSS?

The Exploit Prediction Scoring System (EPSS) is a data-driven model developed by FIRST.org that estimates the probability a CVE will be exploited in the wild within the next 30 days. Unlike CVSS which measures severity, EPSS measures likelihood of exploitation — making it ideal for prioritizing which vulnerabilities to patch first.

Why EPSS matters: With thousands of CVEs published monthly, not all vulnerabilities are equally dangerous. EPSS helps security teams focus on the CVEs most likely to be actively exploited, rather than patching solely by CVSS score. A critical CVSS 9.8 vulnerability with 0.1% EPSS may be less urgent than a high CVSS 7.5 with 90% EPSS.

Prioritize by Exploit Risk

Scan your servers and see which vulnerabilities have the highest EPSS scores. Focus on what attackers are actually targeting.

Start Monitoring Free