Most Exploitable CVEs - EPSS Rankings
CVEs ranked by EPSS (Exploit Prediction Scoring System) probability. Higher scores mean a greater likelihood of exploitation in the wild within the next 30 days.
| Rank | CVE ID | EPSS Score | Percentile | CVSS | Flags | Summary |
|---|---|---|---|---|---|---|
| 2001 | CVE-2025-1168 |
|
35.3th | 6.3 | CVE-2025-1168 is a critical SQL injection vulnerability in SourceCodester Contact Manager with Expor | |
| 2002 | CVE-2025-20183 |
|
35.1th | 5.8 | This vulnerability allows unauthenticated remote attackers to bypass the antivirus scanner on Cisco | |
| 2003 | CVE-2025-0973 |
|
35.2th | 5.4 | This critical vulnerability in CmsEasy 7.7.7.9 allows remote attackers to perform path traversal att | |
| 2004 | CVE-2024-12336 |
|
35.2th | 6.5 | This vulnerability in the WC Affiliate WordPress plugin allows authenticated attackers with Subscrib | |
| 2005 | CVE-2025-1672 |
|
35.2th | 5.5 | The Notibar WordPress plugin has a stored cross-site scripting vulnerability that allows authenticat | |
| 2006 | CVE-2025-12849 |
|
35.3th | 5.3 | The Contest Gallery WordPress plugin has an authorization bypass vulnerability that allows unauthent | |
| 2007 | CVE-2025-12777 |
|
35.3th | 5.3 | The YITH WooCommerce Wishlist plugin for WordPress has an authorization bypass vulnerability that al | |
| 2008 | CVE-2025-13369 |
|
35.1th | 6.1 | The Premmerce WooCommerce Customers Manager plugin for WordPress is vulnerable to reflected cross-si | |
| 2009 | CVE-2025-21514 |
|
35th | 5.3 | This vulnerability in Oracle JD Edwards EnterpriseOne Tools allows unauthenticated attackers with ne | |
| 2010 | CVE-2025-0399 |
|
35.1th | 4.7 | This vulnerability allows remote attackers to upload arbitrary files without restrictions in StarSea | |
| 2011 | CVE-2025-23203 |
|
35.1th | 5.5 | This vulnerability in Icinga Director allows authenticated users with API access to bypass object-le | |
| 2012 | CVE-2022-43851 |
|
35.1th | 5.9 | IBM Aspera Console versions 3.4.0 through 3.4.4 use weak cryptographic algorithms that could allow a | |
| 2013 | CVE-2025-56450 |
|
35th | 6.5 | Log2Space Subscriber Management Software 1.1 contains an unauthenticated SQL injection vulnerability | |
| 2014 | CVE-2025-11814 |
|
35.1th | 6.4 | This stored XSS vulnerability in the Ultimate Addons for WPBakery WordPress plugin allows unauthenti | |
| 2015 | CVE-2025-0848 |
|
34.9th | 6.5 | A critical stack-based buffer overflow vulnerability in Tenda A18 routers allows remote attackers to | |
| 2016 | CVE-2023-46203 |
|
35th | 4.3 | This CVE describes a Missing Authorization vulnerability in the Just Custom Fields WordPress plugin | |
| 2017 | CVE-2023-45002 |
|
35th | 4.3 | This CVE describes a missing authorization vulnerability in the weDevs WP User Frontend WordPress pl | |
| 2018 | CVE-2024-6583 |
|
34.9th | 4.3 | A path traversal vulnerability in stangirard/quivr allows attackers to upload files to arbitrary S3 | |
| 2019 | CVE-2025-21092 |
|
34.8th | 6.5 | GMOD Apollo lacks proper access controls when updating user information, allowing attackers to escal | |
| 2020 | CVE-2025-43857 |
|
35th | 6.5 | This vulnerability in Ruby's Net::IMAP library allows a malicious or compromised IMAP server to caus | |
| 2021 | CVE-2025-5016 |
|
34.9th | 4.7 | The Relevanssi WordPress plugin has a stored XSS vulnerability in excerpt highlighting functionality | |
| 2022 | CVE-2025-4143 |
|
34.9th | 6.1 | This CVE describes an OAuth redirect URI validation vulnerability in the workers-oauth-provider libr | |
| 2023 | CVE-2025-2939 |
|
34.9th | 5.6 | The Ninja Tables WordPress plugin is vulnerable to PHP object injection via deserialization of untru | |
| 2024 | CVE-2025-65502 |
|
34.9th | 4.3 | A null pointer dereference vulnerability in Cesanta Mongoose's add_ca_certs() function allows remote | |
| 2025 | CVE-2025-66169 |
|
34.8th | 5.3 | This CVE describes a Cypher Injection vulnerability in Apache Camel's camel-neo4j component, allowin | |
| 2026 | CVE-2024-55226 |
|
34.7th | 5.4 | Vaultwarden v1.32.5 contains an authenticated reflected cross-site scripting (XSS) vulnerability in | |
| 2027 | CVE-2024-37417 |
|
34.7th | 4.3 | This CSRF vulnerability in the Coachify WordPress theme allows attackers to trick authenticated admi | |
| 2028 | CVE-2024-8685 |
|
34.8th | 4.3 | This path traversal vulnerability in Revolution Pi allows authenticated attackers to list directorie | |
| 2029 | CVE-2024-54564 |
|
34.7th | 6.5 | This vulnerability allows files received via AirDrop to bypass macOS/iOS quarantine flagging, which | |
| 2030 | CVE-2025-2205 |
|
34.8th | 4.4 | This stored XSS vulnerability in the GDPR Cookie Compliance WordPress plugin allows authenticated ad | |
| 2031 | CVE-2025-2089 |
|
34.8th | 5.4 | This vulnerability in StarSea99 starsea-mall allows attackers to bypass access controls and modify u | |
| 2032 | CVE-2025-1534 |
|
34.8th | 5.4 | This CVE describes a cross-site scripting (XSS) vulnerability in Payara Server, allowing attackers t | |
| 2033 | CVE-2024-45516 |
|
34.8th | 6.1 | A Cross-Site Scripting (XSS) vulnerability in Zimbra Collaboration's Classic UI allows attackers to | |
| 2034 | CVE-2023-45584 |
|
34.8th | 6.6 | A double free vulnerability in multiple Fortinet products allows privileged attackers to execute arb | |
| 2035 | CVE-2025-60834 |
|
34.8th | 6.5 | A deserialization vulnerability in uzy-ssm-mall v1.1.0 allows attackers to execute arbitrary code by | |
| 2036 | CVE-2024-58336 |
|
34.8th | 5.3 | Akuvox Smart Intercom S539 devices contain an unauthenticated vulnerability that allows remote attac | |
| 2037 | CVE-2025-22980 |
|
34.7th | 6.7 | A SQL injection vulnerability in SLiMS 9 Bulian 9.6.1 allows attackers to execute arbitrary SQL comm | |
| 2038 | CVE-2025-0580 |
|
34.6th | 5.6 | This CVE describes an authorization bypass vulnerability in Shiprocket Module 3 for OpenCart. Attack | |
| 2039 | CVE-2025-0545 |
|
34.5th | 4.7 | This Cross-Site Scripting (XSS) vulnerability in Tekrom Technology T-Soft E-Commerce allows attacker | |
| 2040 | CVE-2025-1084 |
|
34.6th | 4.3 | This vulnerability allows attackers to perform Cross-Site Request Forgery (CSRF) attacks against Min | |
| 2041 | CVE-2025-31624 |
|
34.7th | 6.5 | This DOM-based Cross-Site Scripting (XSS) vulnerability in the LABCAT Processing Projects WordPress | |
| 2042 | CVE-2025-31621 |
|
34.7th | 6.5 | This stored cross-site scripting (XSS) vulnerability in the byBrick Accordion WordPress plugin allow | |
| 2043 | CVE-2025-31614 |
|
34.7th | 6.5 | This stored cross-site scripting (XSS) vulnerability in the WordPress Terms Before Download plugin a | |
| 2044 | CVE-2025-31608 |
|
34.7th | 6.5 | This stored cross-site scripting (XSS) vulnerability in the CookieHint WP WordPress plugin allows at | |
| 2045 | CVE-2025-31604 |
|
34.7th | 6.5 | This vulnerability allows attackers to inject malicious scripts into Cal.com web pages, which execut | |
| 2046 | CVE-2025-31597 |
|
34.7th | 6.5 | This stored cross-site scripting (XSS) vulnerability in the Ultimate Live Cricket WordPress Lite plu | |
| 2047 | CVE-2025-31595 |
|
34.7th | 6.5 | This stored cross-site scripting (XSS) vulnerability in the WordPress Timeline Event History plugin | |
| 2048 | CVE-2025-31592 |
|
34.7th | 6.5 | This stored cross-site scripting (XSS) vulnerability in the WordPress Send E-mail plugin allows atta | |
| 2049 | CVE-2025-31590 |
|
34.7th | 6.5 | This stored cross-site scripting (XSS) vulnerability in the WP Date and Time Shortcode WordPress plu | |
| 2050 | CVE-2025-31586 |
|
34.7th | 6.5 | This stored cross-site scripting (XSS) vulnerability in the GhozyLab Gallery – Photo Albums WordPr |
What is EPSS?
The Exploit Prediction Scoring System (EPSS) is a data-driven model developed by FIRST.org that estimates the probability a CVE will be exploited in the wild within the next 30 days. Unlike CVSS which measures severity, EPSS measures likelihood of exploitation — making it ideal for prioritizing which vulnerabilities to patch first.
Why EPSS matters: With thousands of CVEs published monthly, not all vulnerabilities are equally dangerous. EPSS helps security teams focus on the CVEs most likely to be actively exploited, rather than patching solely by CVSS score. A critical CVSS 9.8 vulnerability with 0.1% EPSS may be less urgent than a high CVSS 7.5 with 90% EPSS.
Prioritize by Exploit Risk
Scan your servers and see which vulnerabilities have the highest EPSS scores. Focus on what attackers are actually targeting.
Start Monitoring Free