Most Exploitable CVEs - EPSS Rankings
CVEs ranked by EPSS (Exploit Prediction Scoring System) probability. Higher scores mean a greater likelihood of exploitation in the wild within the next 30 days.
| Rank | CVE ID | EPSS Score | Percentile | CVSS | Flags | Summary |
|---|---|---|---|---|---|---|
| 2301 | CVE-2025-15521 |
|
27th | 9.8 | This vulnerability allows unauthenticated attackers to change any user's password in the Academy LMS | |
| 2302 | CVE-2025-64090 |
|
27th | 10.0 | This vulnerability allows authenticated attackers to execute arbitrary commands on affected devices | |
| 2303 | CVE-2026-25526 |
|
27th | 9.8 | CVE-2026-25526 is a critical vulnerability in JinJava template engine that allows attackers to bypas | |
| 2304 | CVE-2025-53004 |
|
26.9th | 9.8 | This vulnerability allows attackers to bypass security controls in DataEase's Redshift JDBC connecti | |
| 2305 | CVE-2025-53005 |
|
26.9th | 9.8 | This vulnerability allows attackers to bypass security controls in DataEase's PostgreSQL data source | |
| 2306 | CVE-2025-6440 |
|
26.8th | 9.8 | The WooCommerce Designer Pro plugin for WordPress has an unauthenticated arbitrary file upload vulne | |
| 2307 | CVE-2025-9152 |
|
26.8th | 9.8 | This vulnerability allows unauthenticated attackers to generate administrative access tokens in WSO2 | |
| 2308 | CVE-2020-36852 |
|
26.7th | 9.1 | This vulnerability in the WordPress Custom Searchable Data Entry System plugin allows unauthenticate | |
| 2309 | CVE-2025-65276 |
|
26.8th | 9.8 | This vulnerability allows unauthenticated attackers to directly access the administrative dashboard | |
| 2310 | CVE-2025-64762 |
|
26.8th | 9.1 | The AuthKit library for Next.js versions 2.11.0 and below fails to apply anti-caching headers to aut | |
| 2311 | CVE-2025-64755 |
|
26.7th | 9.8 | CVE-2025-64755 is a critical vulnerability in Claude Code versions before 2.0.31 that allows attacke | |
| 2312 | CVE-2025-30524 |
|
26.7th | 9.3 | This SQL injection vulnerability in the origincode Product Catalog WordPress plugin allows attackers | |
| 2313 | CVE-2025-28942 |
|
26.7th | 9.3 | This SQL injection vulnerability in the Trust Payments Gateway for WooCommerce plugin allows attacke | |
| 2314 | CVE-2025-26941 |
|
26.7th | 9.3 | This SQL injection vulnerability in the Church Admin WordPress plugin allows attackers to execute ar | |
| 2315 | CVE-2025-32980 |
|
26.7th | 9.8 | NETSCOUT nGeniusONE before version 6.4.0 P11 b3245 has a weak sudo configuration that allows local u | |
| 2316 | CVE-2025-43859 |
|
26.6th | 9.1 | CVE-2025-43859 is an HTTP request smuggling vulnerability in the h11 Python library's parsing of chu | |
| 2317 | CVE-2025-2421 |
|
26.7th | 9.8 | This critical code injection vulnerability in Profelis Informatics SambaBox allows attackers to exec | |
| 2318 | CVE-2025-7343 |
|
26.6th | 9.8 | This SQL injection vulnerability in Digiwin's SFT software allows unauthenticated remote attackers t | |
| 2319 | CVE-2025-27845 |
|
26.6th | 9.8 | ESPEC North America Web Controller 3 versions before 3.3.4 expose JWT secrets when receiving invalid | |
| 2320 | CVE-2025-34198 |
|
26.5th | 9.8 | Vasion Print (formerly PrinterLogic) appliances use the same hardcoded SSH host private keys across | |
| 2321 | CVE-2025-61235 |
|
26.6th | 9.1 | CVE-2025-61235 is an authentication bypass vulnerability in Dataphone A920 devices where specially c | |
| 2322 | CVE-2025-62353 |
|
26.6th | 9.8 | A path traversal vulnerability in Windsurf IDE allows attackers to read and write arbitrary files on | |
| 2323 | CVE-2025-12421 |
|
26.7th | 9.9 | This vulnerability allows authenticated Mattermost users to perform account takeover by exploiting a | |
| 2324 | CVE-2025-12419 |
|
26.7th | 9.9 | This vulnerability allows authenticated attackers with team creation privileges to take over user ac | |
| 2325 | CVE-2025-68435 |
|
26.5th | 9.1 | Zerobyte backup automation tool versions before 0.18.5 and 0.19.0 have an authentication bypass vuln | |
| 2326 | CVE-2025-32576 |
|
26.2th | 9.6 | A Cross-Site Request Forgery (CSRF) vulnerability in the WP shop WordPress plugin allows attackers t | |
| 2327 | CVE-2025-32496 |
|
26.2th | 9.6 | A Cross-Site Request Forgery (CSRF) vulnerability in the Ultra Demo Importer WordPress plugin allows | |
| 2328 | CVE-2025-47952 |
|
26.2th | 9.1 | This vulnerability in Traefik allows attackers to bypass router path matching rules by using URL-enc | |
| 2329 | CVE-2025-48749 |
|
26.5th | 9.1 | Netwrix Directory Manager (formerly Imanami GroupID) versions 11.0.0.0 and earlier, and versions aft | |
| 2330 | CVE-2025-46490 |
|
26.2th | 9.9 | This vulnerability allows attackers to upload arbitrary files, including web shells, to web servers | |
| 2331 | CVE-2025-35996 |
|
26.4th | 9.0 | KUNBUS PiCtory versions 2.11.1 and earlier contain a stored cross-site scripting (XSS) vulnerability | |
| 2332 | CVE-2025-40914 |
|
26.3th | 9.8 | CVE-2025-40914 is an integer overflow vulnerability in Perl CryptX's embedded libtommath library tha | |
| 2333 | CVE-2025-49001 |
|
26.5th | 9.8 | CVE-2025-49001 is a critical authentication bypass vulnerability in DataEase where JWT token secret | |
| 2334 | CVE-2025-54946 |
|
26.4th | 9.8 | A SQL injection vulnerability in SUNNET Corporate Training Management System allows remote attackers | |
| 2335 | CVE-2025-59545 |
|
26.2th | 9.0 | This vulnerability in DNN's Prompt module allows attackers to execute arbitrary scripts through mali | |
| 2336 | CVE-2025-10738 |
|
26.2th | 9.8 | This SQL injection vulnerability in the URL Shortener Plugin For WordPress allows unauthenticated at | |
| 2337 | CVE-2026-24132 |
|
26.5th | 9.8 | Orval versions 7.19.0 and below and 8.0.0-rc.0 through 8.0.2 contain a code injection vulnerability | |
| 2338 | CVE-2025-51958 |
|
26.4th | 9.8 | CVE-2025-51958 is a critical remote code execution vulnerability in the aelsantex runcommand plugin | |
| 2339 | CVE-2024-1509 |
|
26.2th | 9.1 | Brocade ASCG web interface versions before 3.2.0 lack HTTP Strict Transport Security (HSTS) enforcem | |
| 2340 | CVE-2025-22699 |
|
26.1th | 9.0 | This SQL injection vulnerability in the Traveler Code WordPress plugin allows unauthenticated attack | |
| 2341 | CVE-2025-30132 |
|
26.2th | 9.1 | IROAD Dashcam V devices use an unregistered public domain name for internal communication, creating | |
| 2342 | CVE-2025-26844 |
|
26.1th | 9.8 | This vulnerability in Znuny (formerly OTRS) allows attackers to steal session cookies via cross-site | |
| 2343 | CVE-2025-43209 |
|
26.1th | 9.8 | This is a critical out-of-bounds memory access vulnerability in Apple's Safari browser across multip | |
| 2344 | CVE-2025-30135 |
|
26.1th | 9.4 | IROAD Dashcam FX2 devices lack authentication on HTTP and RTSP interfaces, allowing attackers to dow | |
| 2345 | CVE-2025-55398 |
|
26.1th | 9.8 | A vulnerability in mouse07410 asn1c through version 0.9.29 allows attackers to bypass INTEGER constr | |
| 2346 | CVE-2025-50171 |
|
26.1th | 9.1 | This vulnerability allows unauthorized attackers to perform spoofing attacks against Remote Desktop | |
| 2347 | CVE-2025-53792 |
|
26.1th | 9.1 | This is an elevation of privilege vulnerability in Azure Portal that allows authenticated users to g | |
| 2348 | CVE-2025-54807 |
|
26.1th | 9.8 | CVE-2025-54807 allows attackers to bypass authentication by using a hardcoded secret key found in de | |
| 2349 | CVE-2025-8077 |
|
26.1th | 9.8 | NeuVector container security platform versions up to 5.4.5 use a hardcoded default password for the | |
| 2350 | CVE-2024-43166 |
|
26.1th | 9.8 | Apache DolphinScheduler versions before 3.2.2 have incorrect default permissions that could allow un |
What is EPSS?
The Exploit Prediction Scoring System (EPSS) is a data-driven model developed by FIRST.org that estimates the probability a CVE will be exploited in the wild within the next 30 days. Unlike CVSS which measures severity, EPSS measures likelihood of exploitation — making it ideal for prioritizing which vulnerabilities to patch first.
Why EPSS matters: With thousands of CVEs published monthly, not all vulnerabilities are equally dangerous. EPSS helps security teams focus on the CVEs most likely to be actively exploited, rather than patching solely by CVSS score. A critical CVSS 9.8 vulnerability with 0.1% EPSS may be less urgent than a high CVSS 7.5 with 90% EPSS.
Prioritize by Exploit Risk
Scan your servers and see which vulnerabilities have the highest EPSS scores. Focus on what attackers are actually targeting.
Start Monitoring Free