Most Exploitable CVEs - EPSS Rankings

CVEs ranked by EPSS (Exploit Prediction Scoring System) probability. Higher scores mean a greater likelihood of exploitation in the wild within the next 30 days.

164
EPSS > 50%
156
CISA KEV Listed
35,468
CVEs with EPSS
0.7%
Avg EPSS Score
All Critical High Medium Low
Rank CVE ID EPSS Score Percentile CVSS Flags Summary
2151 CVE-2025-47787
0.59%
68.8th 9.8 Emlog Pro versions before 2.5.10 contain a critical file upload vulnerability in the store.php compo
2152 CVE-2025-34284
0.59%
68.8th 8.8 Nagios XI versions before 2024R2 contain an authenticated command injection vulnerability in the Win
2153 CVE-2024-14005
0.59%
68.8th 8.8 Nagios XI versions before 2024R1.2 contain a command injection vulnerability in the Docker Wizard. A
2154 CVE-2024-41454
0.59%
68.7th 6.5 This vulnerability allows attackers to upload malicious PHP or HTML files through the login page log
2155 CVE-2025-3300
0.59%
68.7th 7.2 The WPMasterToolKit WordPress plugin contains a directory traversal vulnerability that allows authen
2156 CVE-2025-56520
0.59%
68.7th 5.3 Dify v1.6.0 contains a Server-Side Request Forgery (SSRF) vulnerability in the RemoteFileUploadApi c
2157 CVE-2025-2262
0.59%
68.7th 7.3 This vulnerability allows unauthenticated attackers to execute arbitrary WordPress shortcodes throug
2158 CVE-2025-4032
0.59%
68.7th 5.0 This CVE describes a critical OS command injection vulnerability in inclusionAI AWorld's shell_tool.
2159 CVE-2025-5621
0.59%
68.7th 7.3 This critical vulnerability in D-Link DIR-816 routers allows remote attackers to execute arbitrary o
2160 CVE-2024-14010
0.59%
68.7th 9.8 Typora 1.7.4 contains a command injection vulnerability in PDF export preferences that allows attack
2161 CVE-2025-2479
0.59%
68.7th 6.1 The Easy Custom Admin Bar WordPress plugin contains a reflected cross-site scripting (XSS) vulnerabi
2162 CVE-2025-10494
0.59%
68.7th 8.1 This vulnerability allows authenticated WordPress users with Subscriber-level access or higher to de
2163 CVE-2025-63225
0.59%
68.7th 9.8 The Eurolab ELTS100_UBX device with firmware ELTS100v1.UBX has critical administrative endpoints tha
2164 CVE-2024-51376
0.59%
68.6th 7.5 A directory traversal vulnerability in yeqifu carRental v1.0 allows remote attackers to access sensi
2165 CVE-2025-29287
0.59%
68.6th 9.8 An arbitrary file upload vulnerability in the ueditor component of MCMS v5.4.3 allows attackers to u
2166 CVE-2025-53948
0.59%
68.6th 7.5 CVE-2025-53948 is a denial-of-service vulnerability in Sante PACS Server where a remote attacker can
2167 CVE-2025-22133
0.59%
68.6th 9.9 CVE-2025-22133 is a critical file upload vulnerability in WeGIA web management software that allows
2168 CVE-2025-21627
0.59%
68.6th 6.5 GLPI versions before 10.0.18 contain a reflected cross-site scripting (XSS) vulnerability on the sea
2169 CVE-2025-22469
0.59%
68.6th 7.3 This CVE describes an OS command injection vulnerability in Sato CL4/6NX Plus and CL4/6NX-J Plus lab
2170 CVE-2023-42232
0.59%
68.6th 7.5 This directory traversal vulnerability in Pat Infinite Solutions HelpdeskAdvanced allows attackers t
2171 CVE-2023-42227
0.59%
68.6th 7.5 This vulnerability allows attackers to perform directory traversal attacks through the WSCView/Save
2172 CVE-2023-42226
0.59%
68.6th 7.5 This vulnerability allows attackers to perform directory traversal attacks through the Email/SaveAtt
2173 CVE-2023-42225
0.59%
68.6th 7.5 This directory traversal vulnerability in Pat Infinite Solutions HelpdeskAdvanced allows attackers t
2174 CVE-2025-50722
0.59%
68.6th 9.8 This CVE describes an insecure permissions vulnerability in sparkshop v1.1.7 that allows remote atta
2175 CVE-2025-7846
0.59%
68.6th 8.8 The WordPress User Extra Fields plugin has an arbitrary file deletion vulnerability in all versions
2176 CVE-2025-25206
0.59%
68.5th 8.3 This SQL injection vulnerability in eLabFTW allows authenticated users to read sensitive database in
2177 CVE-2024-56282
0.58%
68.5th 7.5 This vulnerability allows attackers to include local files on the server through improper filename c
2178 CVE-2024-56281
0.58%
68.5th 7.5 This vulnerability allows attackers to include local files on the server through improper filename c
2179 CVE-2025-24039
0.58%
68.5th 7.3 This CVE describes an elevation of privilege vulnerability in Visual Studio Code where an attacker c
2180 CVE-2025-8245
0.58%
68.5th 8.8 This critical buffer overflow vulnerability in TOTOLINK X15 routers allows remote attackers to execu
2181 CVE-2025-8136
0.58%
68.5th 8.8 This critical vulnerability in TOTOLINK A702R routers allows remote attackers to execute arbitrary c
2182 CVE-2025-23220
0.58%
68.4th 9.8 CVE-2025-23220 is a critical SQL injection vulnerability in WeGIA's adicionar_raca.php endpoint that
2183 CVE-2025-23218
0.58%
68.4th 9.8 CVE-2025-23218 is a critical SQL injection vulnerability in WeGIA's adicionar_especie.php endpoint t
2184 CVE-2025-21364
0.58%
68.4th 7.8 This vulnerability allows attackers to bypass security features in Microsoft Excel, potentially enab
2185 CVE-2025-3278
0.58%
68.4th 9.8 The UrbanGo Membership WordPress plugin allows unauthenticated attackers to register accounts with a
2186 CVE-2025-3675
0.58%
68.4th 5.3 This critical vulnerability in TOTOLINK A3700R routers allows attackers to bypass access controls on
2187 CVE-2025-32461
0.58%
68.5th 9.9 CVE-2025-32461 is a critical remote code execution vulnerability in Tiki Wiki CMS where the wikiplug
2188 CVE-2025-5392
0.58%
68.4th 9.8 The GB Forms DB WordPress plugin has a critical remote code execution vulnerability that allows unau
2189 CVE-2025-54958
0.58%
68.4th 6.3 This CVE describes an OS command injection vulnerability in Powered BLUE 870 software versions 0.201
2190 CVE-2024-58284
0.58%
68.4th 7.2 PopojiCMS 2.0.1 contains an authenticated remote command execution vulnerability where administrativ
2191 CVE-2025-13184
0.58%
68.5th 9.8 This critical vulnerability allows unauthenticated attackers to enable Telnet service and gain root
2192 CVE-2025-3197
0.58%
68.4th 7.3 CVE-2025-3197 is a prototype pollution vulnerability in the expand-object npm package that allows at
2193 CVE-2025-8138
0.58%
68.4th 8.8 This critical vulnerability in TOTOLINK A702R routers allows remote attackers to execute arbitrary c
2194 CVE-2025-9523
0.58%
68.4th 9.8 This vulnerability in Tenda AC1206 routers allows remote attackers to execute arbitrary code via a s
2195 CVE-2024-13622
0.58%
68.4th 7.5 The File Uploads Addon for WooCommerce WordPress plugin exposes sensitive customer data through inse
2196 CVE-2024-57602
0.58%
68.4th 9.8 A privilege escalation vulnerability in EasyAppointments v1.5.0 allows remote attackers to gain elev
2197 CVE-2024-12992
0.58%
68.4th 9.8 This critical vulnerability in Pandora FMS allows attackers to execute arbitrary operating system co
2198 CVE-2025-20337
0.58%
68.3th 10.0 KEV An unauthenticated remote code execution vulnerability in Cisco ISE and ISE-PIC allows attackers to
2199 CVE-2025-59361
0.58%
68.4th 9.8 CVE-2025-59361 is an OS command injection vulnerability in Chaos Mesh's cleanIptables mutation that
2200 CVE-2025-25968
0.58%
68.3th 6.0 This vulnerability allows editor-privileged users in DDSN Interactive cm3 Acora CMS version 10.1.1 t

What is EPSS?

The Exploit Prediction Scoring System (EPSS) is a data-driven model developed by FIRST.org that estimates the probability a CVE will be exploited in the wild within the next 30 days. Unlike CVSS which measures severity, EPSS measures likelihood of exploitation — making it ideal for prioritizing which vulnerabilities to patch first.

Why EPSS matters: With thousands of CVEs published monthly, not all vulnerabilities are equally dangerous. EPSS helps security teams focus on the CVEs most likely to be actively exploited, rather than patching solely by CVSS score. A critical CVSS 9.8 vulnerability with 0.1% EPSS may be less urgent than a high CVSS 7.5 with 90% EPSS.

Prioritize by Exploit Risk

Scan your servers and see which vulnerabilities have the highest EPSS scores. Focus on what attackers are actually targeting.

Start Monitoring Free