Most Exploitable CVEs - EPSS Rankings

CVEs ranked by EPSS (Exploit Prediction Scoring System) probability. Higher scores mean a greater likelihood of exploitation in the wild within the next 30 days.

164
EPSS > 50%
156
CISA KEV Listed
35,468
CVEs with EPSS
0.7%
Avg EPSS Score
All Critical High Medium Low
Rank CVE ID EPSS Score Percentile CVSS Flags Summary
2001 CVE-2025-54802
0.64%
70.1th 9.8 This vulnerability in pyLoad allows unauthenticated attackers to perform path traversal via the addc
2002 CVE-2024-10866
0.64%
70th 5.3 The Export Import Menus WordPress plugin has an authorization bypass vulnerability that allows unaut
2003 CVE-2025-29802
0.64%
70th 7.3 This vulnerability allows an authenticated attacker with local access to a system running Visual Stu
2004 CVE-2025-27533
0.64%
70th 7.5 This vulnerability in Apache ActiveMQ allows attackers to cause denial of service by sending special
2005 CVE-2024-12822
0.64%
70th 9.8 The Media Manager for UserPro WordPress plugin has an authentication bypass vulnerability that allow
2006 CVE-2024-8420
0.64%
70th 9.8 The DHVC Form WordPress plugin has a privilege escalation vulnerability that allows unauthenticated
2007 CVE-2024-12860
0.64%
70th 9.8 This vulnerability allows unauthenticated attackers to reset passwords for any user account in CarSp
2008 CVE-2024-12213
0.64%
70th 9.8 The WP Job Board Pro WordPress plugin has a critical privilege escalation vulnerability that allows
2009 CVE-2024-13446
0.64%
70th 9.8 The Workreap WordPress plugin allows unauthenticated attackers to take over any user account, includ
2010 CVE-2024-12876
0.64%
70th 9.8 This vulnerability allows unauthenticated attackers to change any WordPress user's password, includi
2011 CVE-2025-29033
0.64%
70th 7.3 This vulnerability in BambooHR Build allows remote attackers to perform privilege escalation through
2012 CVE-2024-58286
0.64%
70th N/A CVE-2024-58286 is a remote code execution vulnerability in dizqueTV 1.5.3 that allows attackers to i
2013 CVE-2025-6021
0.64%
70th 7.5 This CVE describes an integer overflow vulnerability in libxml2's xmlBuildQName function that can ca
2014 CVE-2024-13903
0.64%
70th 4.3 This CVE describes a stack-based buffer overflow vulnerability in quickjs-ng QuickJS JavaScript engi
2015 CVE-2024-56180
0.64%
69.9th 9.8 This vulnerability allows attackers to achieve remote code execution on Apache EventMesh servers by
2016 CVE-2024-9439
0.64%
69.9th 8.8 SuperAGI's latest version contains a critical remote code execution vulnerability in the agent templ
2017 CVE-2023-47029
0.64%
70th 9.8 CVE-2023-47029 is a critical vulnerability in NCR Terminal Handler v1.5.1 that allows remote attacke
2018 CVE-2025-21402
0.64%
69.9th 7.8 This vulnerability in Microsoft Office OneNote allows remote attackers to execute arbitrary code on
2019 CVE-2025-2773
0.64%
69.9th 7.2 This vulnerability allows authenticated remote attackers to execute arbitrary commands on BEC Techno
2020 CVE-2025-3668
0.64%
69.9th 5.3 This vulnerability allows remote attackers to bypass access controls on TOTOLINK A3700R routers via
2021 CVE-2025-41723
0.64%
69.9th 9.8 CVE-2025-41723 is a critical directory traversal vulnerability in the importFile SOAP method that al
2022 CVE-2025-25205
0.63%
69.9th 8.2 A vulnerability in Audiobookshelf versions 2.17.0 through 2.19.0 allows unauthenticated attackers to
2023 CVE-2025-28100
0.63%
69.9th 9.8 A SQL injection vulnerability in dingfanzuCMS v1.0 allows attackers to execute arbitrary SQL command
2024 CVE-2025-61920
0.63%
69.9th 7.5 This vulnerability in Authlib allows remote attackers to craft malicious JWT tokens with extremely l
2025 CVE-2025-23419
0.63%
69.8th 4.3 This CVE describes a client certificate authentication bypass vulnerability in nginx when multiple s
2026 CVE-2025-11900
0.63%
69.8th 9.8 CVE-2025-11900 is an unauthenticated remote OS command injection vulnerability in HGiga's iSherlock
2027 CVE-2025-66261
0.63%
69.8th 9.8 This CVE describes an unauthenticated OS command injection vulnerability in DB Electronica Telecomun
2028 CVE-2025-66253
0.63%
69.8th 9.8 This vulnerability allows unauthenticated attackers to execute arbitrary operating system commands o
2029 CVE-2025-13284
0.63%
69.8th 9.8 ThinPLUS software contains an OS command injection vulnerability that allows unauthenticated remote
2030 CVE-2025-64539
0.63%
69.8th 9.3 Adobe Experience Manager versions 6.5.23 and earlier contain a DOM-based Cross-Site Scripting vulner
2031 CVE-2025-64538
0.63%
69.8th 9.3 Adobe Experience Manager versions 6.5.23 and earlier contain a DOM-based Cross-Site Scripting vulner
2032 CVE-2025-64537
0.63%
69.8th 9.3 Adobe Experience Manager versions 6.5.23 and earlier contain a DOM-based Cross-Site Scripting vulner
2033 CVE-2025-13661
0.63%
69.8th 7.1 CVE-2025-13661 is a path traversal vulnerability in Ivanti Endpoint Manager that allows authenticate
2034 CVE-2025-30364
0.63%
69.8th 9.8 A SQL injection vulnerability in WeGIA versions before 3.2.8 allows attackers to execute arbitrary S
2035 CVE-2025-3123
0.63%
69.8th 4.7 This vulnerability in WonderCMS 3.5.0 allows remote attackers to upload arbitrary files through the
2036 CVE-2025-4660
0.63%
69.8th 9.8 This vulnerability allows unauthenticated remote attackers to execute arbitrary code on Windows syst
2037 CVE-2025-5717
0.63%
69.8th 6.8 This CVE describes an authenticated remote code execution vulnerability in WSO2 products where admin
2038 CVE-2025-2370
0.63%
69.8th 8.8 A critical stack-based buffer overflow vulnerability in TOTOLINK EX1800T WiFi extenders allows remot
2039 CVE-2024-56158
0.63%
69.8th 9.8 This vulnerability allows authenticated XWiki users to execute arbitrary SQL queries on Oracle datab
2040 CVE-2025-3820
0.63%
69.8th 8.8 A critical stack-based buffer overflow vulnerability in Tenda W12 and i24 routers allows remote atta
2041 CVE-2025-23123
0.63%
69.8th 10.0 A heap buffer overflow vulnerability in UniFi Protect Camera firmware allows remote code execution.
2042 CVE-2025-63655
0.63%
69.8th 7.5 This vulnerability allows attackers to crash Monkey web servers by sending specially crafted HTTP re
2043 CVE-2024-13473
0.63%
69.7th 7.5 This SQL injection vulnerability in the LTL Freight Quotes WordPress plugin allows unauthenticated a
2044 CVE-2025-21350
0.63%
69.7th 5.9 This Windows Kerberos vulnerability allows attackers to cause a denial of service by sending special
2045 CVE-2025-64439
0.63%
69.7th N/A LangGraph SQLite Checkpoint versions 2.1.2 and below contain a Remote Code Execution vulnerability i
2046 CVE-2022-50793
0.63%
69.7th 8.8 This vulnerability allows authenticated attackers to execute arbitrary system commands on SOUND4 IMP
2047 CVE-2024-54852
0.63%
69.7th 9.8 This LDAP injection vulnerability in Teedy allows unauthenticated attackers to manipulate LDAP queri
2048 CVE-2025-21179
0.63%
69.7th 4.8 This vulnerability in the DHCP Client Service allows an attacker to cause a denial of service by sen
2049 CVE-2025-1565
0.63%
69.7th 7.5 The Mayosis Core WordPress plugin contains an arbitrary file read vulnerability in all versions up t
2050 CVE-2025-3199
0.63%
69.7th 7.3 This CVE describes an improper authorization vulnerability in the ruoyi-ai software up to version 2.

What is EPSS?

The Exploit Prediction Scoring System (EPSS) is a data-driven model developed by FIRST.org that estimates the probability a CVE will be exploited in the wild within the next 30 days. Unlike CVSS which measures severity, EPSS measures likelihood of exploitation — making it ideal for prioritizing which vulnerabilities to patch first.

Why EPSS matters: With thousands of CVEs published monthly, not all vulnerabilities are equally dangerous. EPSS helps security teams focus on the CVEs most likely to be actively exploited, rather than patching solely by CVSS score. A critical CVSS 9.8 vulnerability with 0.1% EPSS may be less urgent than a high CVSS 7.5 with 90% EPSS.

Prioritize by Exploit Risk

Scan your servers and see which vulnerabilities have the highest EPSS scores. Focus on what attackers are actually targeting.

Start Monitoring Free