Most Exploitable CVEs - EPSS Rankings
CVEs ranked by EPSS (Exploit Prediction Scoring System) probability. Higher scores mean a greater likelihood of exploitation in the wild within the next 30 days.
| Rank | CVE ID | EPSS Score | Percentile | CVSS | Flags | Summary |
|---|---|---|---|---|---|---|
| 2001 | CVE-2025-54802 |
|
70.1th | 9.8 | This vulnerability in pyLoad allows unauthenticated attackers to perform path traversal via the addc | |
| 2002 | CVE-2024-10866 |
|
70th | 5.3 | The Export Import Menus WordPress plugin has an authorization bypass vulnerability that allows unaut | |
| 2003 | CVE-2025-29802 |
|
70th | 7.3 | This vulnerability allows an authenticated attacker with local access to a system running Visual Stu | |
| 2004 | CVE-2025-27533 |
|
70th | 7.5 | This vulnerability in Apache ActiveMQ allows attackers to cause denial of service by sending special | |
| 2005 | CVE-2024-12822 |
|
70th | 9.8 | The Media Manager for UserPro WordPress plugin has an authentication bypass vulnerability that allow | |
| 2006 | CVE-2024-8420 |
|
70th | 9.8 | The DHVC Form WordPress plugin has a privilege escalation vulnerability that allows unauthenticated | |
| 2007 | CVE-2024-12860 |
|
70th | 9.8 | This vulnerability allows unauthenticated attackers to reset passwords for any user account in CarSp | |
| 2008 | CVE-2024-12213 |
|
70th | 9.8 | The WP Job Board Pro WordPress plugin has a critical privilege escalation vulnerability that allows | |
| 2009 | CVE-2024-13446 |
|
70th | 9.8 | The Workreap WordPress plugin allows unauthenticated attackers to take over any user account, includ | |
| 2010 | CVE-2024-12876 |
|
70th | 9.8 | This vulnerability allows unauthenticated attackers to change any WordPress user's password, includi | |
| 2011 | CVE-2025-29033 |
|
70th | 7.3 | This vulnerability in BambooHR Build allows remote attackers to perform privilege escalation through | |
| 2012 | CVE-2024-58286 |
|
70th | N/A | CVE-2024-58286 is a remote code execution vulnerability in dizqueTV 1.5.3 that allows attackers to i | |
| 2013 | CVE-2025-6021 |
|
70th | 7.5 | This CVE describes an integer overflow vulnerability in libxml2's xmlBuildQName function that can ca | |
| 2014 | CVE-2024-13903 |
|
70th | 4.3 | This CVE describes a stack-based buffer overflow vulnerability in quickjs-ng QuickJS JavaScript engi | |
| 2015 | CVE-2024-56180 |
|
69.9th | 9.8 | This vulnerability allows attackers to achieve remote code execution on Apache EventMesh servers by | |
| 2016 | CVE-2024-9439 |
|
69.9th | 8.8 | SuperAGI's latest version contains a critical remote code execution vulnerability in the agent templ | |
| 2017 | CVE-2023-47029 |
|
70th | 9.8 | CVE-2023-47029 is a critical vulnerability in NCR Terminal Handler v1.5.1 that allows remote attacke | |
| 2018 | CVE-2025-21402 |
|
69.9th | 7.8 | This vulnerability in Microsoft Office OneNote allows remote attackers to execute arbitrary code on | |
| 2019 | CVE-2025-2773 |
|
69.9th | 7.2 | This vulnerability allows authenticated remote attackers to execute arbitrary commands on BEC Techno | |
| 2020 | CVE-2025-3668 |
|
69.9th | 5.3 | This vulnerability allows remote attackers to bypass access controls on TOTOLINK A3700R routers via | |
| 2021 | CVE-2025-41723 |
|
69.9th | 9.8 | CVE-2025-41723 is a critical directory traversal vulnerability in the importFile SOAP method that al | |
| 2022 | CVE-2025-25205 |
|
69.9th | 8.2 | A vulnerability in Audiobookshelf versions 2.17.0 through 2.19.0 allows unauthenticated attackers to | |
| 2023 | CVE-2025-28100 |
|
69.9th | 9.8 | A SQL injection vulnerability in dingfanzuCMS v1.0 allows attackers to execute arbitrary SQL command | |
| 2024 | CVE-2025-61920 |
|
69.9th | 7.5 | This vulnerability in Authlib allows remote attackers to craft malicious JWT tokens with extremely l | |
| 2025 | CVE-2025-23419 |
|
69.8th | 4.3 | This CVE describes a client certificate authentication bypass vulnerability in nginx when multiple s | |
| 2026 | CVE-2025-11900 |
|
69.8th | 9.8 | CVE-2025-11900 is an unauthenticated remote OS command injection vulnerability in HGiga's iSherlock | |
| 2027 | CVE-2025-66261 |
|
69.8th | 9.8 | This CVE describes an unauthenticated OS command injection vulnerability in DB Electronica Telecomun | |
| 2028 | CVE-2025-66253 |
|
69.8th | 9.8 | This vulnerability allows unauthenticated attackers to execute arbitrary operating system commands o | |
| 2029 | CVE-2025-13284 |
|
69.8th | 9.8 | ThinPLUS software contains an OS command injection vulnerability that allows unauthenticated remote | |
| 2030 | CVE-2025-64539 |
|
69.8th | 9.3 | Adobe Experience Manager versions 6.5.23 and earlier contain a DOM-based Cross-Site Scripting vulner | |
| 2031 | CVE-2025-64538 |
|
69.8th | 9.3 | Adobe Experience Manager versions 6.5.23 and earlier contain a DOM-based Cross-Site Scripting vulner | |
| 2032 | CVE-2025-64537 |
|
69.8th | 9.3 | Adobe Experience Manager versions 6.5.23 and earlier contain a DOM-based Cross-Site Scripting vulner | |
| 2033 | CVE-2025-13661 |
|
69.8th | 7.1 | CVE-2025-13661 is a path traversal vulnerability in Ivanti Endpoint Manager that allows authenticate | |
| 2034 | CVE-2025-30364 |
|
69.8th | 9.8 | A SQL injection vulnerability in WeGIA versions before 3.2.8 allows attackers to execute arbitrary S | |
| 2035 | CVE-2025-3123 |
|
69.8th | 4.7 | This vulnerability in WonderCMS 3.5.0 allows remote attackers to upload arbitrary files through the | |
| 2036 | CVE-2025-4660 |
|
69.8th | 9.8 | This vulnerability allows unauthenticated remote attackers to execute arbitrary code on Windows syst | |
| 2037 | CVE-2025-5717 |
|
69.8th | 6.8 | This CVE describes an authenticated remote code execution vulnerability in WSO2 products where admin | |
| 2038 | CVE-2025-2370 |
|
69.8th | 8.8 | A critical stack-based buffer overflow vulnerability in TOTOLINK EX1800T WiFi extenders allows remot | |
| 2039 | CVE-2024-56158 |
|
69.8th | 9.8 | This vulnerability allows authenticated XWiki users to execute arbitrary SQL queries on Oracle datab | |
| 2040 | CVE-2025-3820 |
|
69.8th | 8.8 | A critical stack-based buffer overflow vulnerability in Tenda W12 and i24 routers allows remote atta | |
| 2041 | CVE-2025-23123 |
|
69.8th | 10.0 | A heap buffer overflow vulnerability in UniFi Protect Camera firmware allows remote code execution. | |
| 2042 | CVE-2025-63655 |
|
69.8th | 7.5 | This vulnerability allows attackers to crash Monkey web servers by sending specially crafted HTTP re | |
| 2043 | CVE-2024-13473 |
|
69.7th | 7.5 | This SQL injection vulnerability in the LTL Freight Quotes WordPress plugin allows unauthenticated a | |
| 2044 | CVE-2025-21350 |
|
69.7th | 5.9 | This Windows Kerberos vulnerability allows attackers to cause a denial of service by sending special | |
| 2045 | CVE-2025-64439 |
|
69.7th | N/A | LangGraph SQLite Checkpoint versions 2.1.2 and below contain a Remote Code Execution vulnerability i | |
| 2046 | CVE-2022-50793 |
|
69.7th | 8.8 | This vulnerability allows authenticated attackers to execute arbitrary system commands on SOUND4 IMP | |
| 2047 | CVE-2024-54852 |
|
69.7th | 9.8 | This LDAP injection vulnerability in Teedy allows unauthenticated attackers to manipulate LDAP queri | |
| 2048 | CVE-2025-21179 |
|
69.7th | 4.8 | This vulnerability in the DHCP Client Service allows an attacker to cause a denial of service by sen | |
| 2049 | CVE-2025-1565 |
|
69.7th | 7.5 | The Mayosis Core WordPress plugin contains an arbitrary file read vulnerability in all versions up t | |
| 2050 | CVE-2025-3199 |
|
69.7th | 7.3 | This CVE describes an improper authorization vulnerability in the ruoyi-ai software up to version 2. |
What is EPSS?
The Exploit Prediction Scoring System (EPSS) is a data-driven model developed by FIRST.org that estimates the probability a CVE will be exploited in the wild within the next 30 days. Unlike CVSS which measures severity, EPSS measures likelihood of exploitation — making it ideal for prioritizing which vulnerabilities to patch first.
Why EPSS matters: With thousands of CVEs published monthly, not all vulnerabilities are equally dangerous. EPSS helps security teams focus on the CVEs most likely to be actively exploited, rather than patching solely by CVSS score. A critical CVSS 9.8 vulnerability with 0.1% EPSS may be less urgent than a high CVSS 7.5 with 90% EPSS.
Prioritize by Exploit Risk
Scan your servers and see which vulnerabilities have the highest EPSS scores. Focus on what attackers are actually targeting.
Start Monitoring Free