Most Exploitable CVEs - EPSS Rankings

CVEs ranked by EPSS (Exploit Prediction Scoring System) probability. Higher scores mean a greater likelihood of exploitation in the wild within the next 30 days.

164
EPSS > 50%
156
CISA KEV Listed
35,468
CVEs with EPSS
0.7%
Avg EPSS Score
All Critical High Medium Low
Rank CVE ID EPSS Score Percentile CVSS Flags Summary
1951 CVE-2025-15010
0.14%
33.9th 9.8 A stack-based buffer overflow vulnerability exists in Tenda WH450 routers version 1.0.0.18, specific
1952 CVE-2025-15007
0.14%
33.9th 9.8 A stack-based buffer overflow vulnerability in Tenda WH450 routers allows remote attackers to execut
1953 CVE-2025-15006
0.14%
33.9th 9.8 This vulnerability allows remote attackers to execute arbitrary code on Tenda WH450 routers by explo
1954 CVE-2025-14665
0.14%
33.9th 9.8 A remote stack-based buffer overflow vulnerability in Tenda WH450 routers allows attackers to execut
1955 CVE-2025-63535
0.14%
33.9th 9.6 This SQL injection vulnerability in Blood Bank Management System 1.0 allows attackers to inject mali
1956 CVE-2025-63532
0.14%
33.9th 9.6 A SQL injection vulnerability in Blood Bank Management System 1.0 allows attackers to inject malicio
1957 CVE-2025-29980
0.14%
33.7th 9.8 A critical SQL injection vulnerability in eTRAKiT.net release 3.2.1.77 allows remote unauthenticated
1958 CVE-2025-47945
0.14%
33.7th 9.1 CVE-2025-47945 is a critical authentication bypass vulnerability in Donetick task management softwar
1959 CVE-2025-14301
0.14%
33.6th 9.8 This vulnerability in the Integration Opvius AI for WooCommerce WordPress plugin allows unauthentica
1960 CVE-2025-32966
0.14%
33.5th 9.8 DataEase versions before 2.10.8 contain a vulnerability where authenticated users can achieve remote
1961 CVE-2025-43261
0.14%
33.5th 9.8 This CVE describes a sandbox escape vulnerability in macOS that allows malicious applications to bre
1962 CVE-2025-69269
0.14%
33.5th 9.8 This OS command injection vulnerability in Broadcom DX NetOps Spectrum allows attackers to execute a
1963 CVE-2025-1283
0.14%
33.4th 9.8 This vulnerability allows attackers to bypass authentication on Dingtian DT-R0 Series devices by dir
1964 CVE-2025-49885
0.14%
33.4th 10.0 This vulnerability allows unauthenticated attackers to upload arbitrary files, including web shells,
1965 CVE-2025-59272
0.14%
33.4th 9.3 This command injection vulnerability in Copilot allows unauthorized local attackers to execute arbit
1966 CVE-2025-59252
0.14%
33.4th 9.3 This command injection vulnerability in Copilot allows unauthorized attackers to execute arbitrary c
1967 CVE-2023-53966
0.14%
33.4th 9.8 CVE-2023-53966 is a format string vulnerability in SOUND4 LinkAndShare Transmitter 1.1.2 that allows
1968 CVE-2025-48336
0.13%
33.2th 9.8 A deserialization vulnerability in ThimPress Course Builder WordPress theme allows attackers to inje
1969 CVE-2025-47568
0.13%
33.2th 9.8 This CVE describes a PHP object injection vulnerability in the ZoomSounds WordPress plugin that allo
1970 CVE-2025-47530
0.13%
33.2th 9.8 This vulnerability allows attackers to inject malicious PHP objects through deserialization of untru
1971 CVE-2025-39503
0.13%
33.2th 9.8 This vulnerability allows remote attackers to execute arbitrary code via PHP object injection throug
1972 CVE-2025-39500
0.13%
33.2th 9.8 This vulnerability allows remote attackers to execute arbitrary code through PHP object injection vi
1973 CVE-2025-39495
0.13%
33.2th 9.8 A PHP object injection vulnerability in the BoldThemes Avantage WordPress theme allows attackers to
1974 CVE-2025-39480
0.13%
33.2th 9.8 This vulnerability allows attackers to execute arbitrary code on WordPress sites using the Car Deale
1975 CVE-2025-32292
0.13%
33.2th 9.8 This vulnerability allows remote attackers to execute arbitrary code on WordPress sites using the Ja
1976 CVE-2025-31927
0.13%
33.2th 9.8 CVE-2025-31927 is a PHP object injection vulnerability in the Acerola WordPress theme that allows at
1977 CVE-2025-31631
0.13%
33.2th 9.8 This CVE describes a PHP object injection vulnerability in the Fish House WordPress theme due to ins
1978 CVE-2025-31423
0.13%
33.2th 9.8 CVE-2025-31423 is a PHP object injection vulnerability in the Umberto WordPress theme that allows at
1979 CVE-2025-31069
0.13%
33.2th 9.8 This vulnerability allows attackers to inject malicious objects through deserialization of untrusted
1980 CVE-2025-31049
0.13%
33.2th 9.8 CVE-2025-31049 is a PHP object injection vulnerability in the Dash WordPress theme that allows attac
1981 CVE-2025-24977
0.13%
33.2th 9.1 OpenCTI versions before 6.4.11 contain a critical vulnerability where users with 'manage customizati
1982 CVE-2026-1358
0.13%
33.1th 9.8 Airleader Master versions 6.381 and prior have unrestricted file upload functionality on multiple we
1983 CVE-2025-12762
0.13%
33.3th 9.1 pgAdmin versions up to 9.9 running in server mode are vulnerable to remote code execution when proce
1984 CVE-2025-25948
0.13%
33th 9.1 This vulnerability allows unauthenticated attackers to create and modify user accounts, including Ad
1985 CVE-2025-46066
0.13%
33.1th 9.9 A privilege escalation vulnerability in Automai Director v.25.2.0 allows remote attackers to gain el
1986 CVE-2025-14998
0.13%
33th 9.8 The Branda WordPress plugin has an authentication bypass vulnerability that allows unauthenticated a
1987 CVE-2025-1907
0.13%
32.9th 9.8 Instantel Micromate devices have an unauthenticated configuration port that allows attackers to exec
1988 CVE-2025-5277
0.13%
32.9th 9.6 CVE-2025-5277 is a command injection vulnerability in aws-mcp-server that allows attackers to execut
1989 CVE-2025-46337
0.13%
33th 10.0 This is a critical SQL injection vulnerability in ADOdb PHP database library affecting PostgreSQL co
1990 CVE-2025-6169
0.13%
32.9th 9.8 CVE-2025-6169 is a critical SQL injection vulnerability in HAMASTAR Technology's WIMP website co-con
1991 CVE-2025-12285
0.13%
32.9th 9.8 CVE-2025-12285 is a missing initial password change vulnerability affecting BLU-IC2 and BLU-IC4 devi
1992 CVE-2025-41734
0.13%
33th 9.8 This critical vulnerability allows unauthenticated remote attackers to execute arbitrary PHP files o
1993 CVE-2025-9697
0.13%
32.9th 9.8 This CVE describes a critical SQL injection vulnerability in the Ajax WooSearch WordPress plugin. Un
1994 CVE-2025-64281
0.13%
32.9th 9.8 This critical authentication bypass vulnerability in CentralSquare Community Development allows atta
1995 CVE-2025-47151
0.13%
32.9th 9.8 A type confusion vulnerability in Entr'ouvert Lasso's SAML parsing allows remote code execution when
1996 CVE-2024-6829
0.13%
32.7th 9.1 This vulnerability in aimhubio/aim allows attackers to exploit insecure tarfile extraction to write
1997 CVE-2025-45777
0.13%
32.8th 9.8 This vulnerability allows attackers to bypass authentication on Chavara Matrimony Site v2.0 by explo
1998 CVE-2025-64103
0.13%
32.8th 9.8 This vulnerability allows attackers to bypass multi-factor authentication (MFA) in Zitadel by target
1999 CVE-2025-65084
0.13%
32.7th 9.8 An Out-of-Bounds Write vulnerability in Ashlar-Vellum CAD software allows attackers to execute arbit
2000 CVE-2025-14741
0.13%
32.8th 9.1 The Frontend Admin by DynamiApps WordPress plugin has an authorization bypass vulnerability that all

What is EPSS?

The Exploit Prediction Scoring System (EPSS) is a data-driven model developed by FIRST.org that estimates the probability a CVE will be exploited in the wild within the next 30 days. Unlike CVSS which measures severity, EPSS measures likelihood of exploitation — making it ideal for prioritizing which vulnerabilities to patch first.

Why EPSS matters: With thousands of CVEs published monthly, not all vulnerabilities are equally dangerous. EPSS helps security teams focus on the CVEs most likely to be actively exploited, rather than patching solely by CVSS score. A critical CVSS 9.8 vulnerability with 0.1% EPSS may be less urgent than a high CVSS 7.5 with 90% EPSS.

Prioritize by Exploit Risk

Scan your servers and see which vulnerabilities have the highest EPSS scores. Focus on what attackers are actually targeting.

Start Monitoring Free