Most Exploitable CVEs - EPSS Rankings

CVEs ranked by EPSS (Exploit Prediction Scoring System) probability. Higher scores mean a greater likelihood of exploitation in the wild within the next 30 days.

164
EPSS > 50%
156
CISA KEV Listed
35,468
CVEs with EPSS
0.7%
Avg EPSS Score
All Critical High Medium Low
Rank CVE ID EPSS Score Percentile CVSS Flags Summary
2401 CVE-2025-14138
0.13%
32.5th 6.1 The WPLG Default Mail From WordPress plugin contains a reflected cross-site scripting vulnerability
2402 CVE-2025-14132
0.13%
32.5th 6.1 The Category Dropdown List WordPress plugin contains a reflected cross-site scripting (XSS) vulnerab
2403 CVE-2025-14125
0.13%
32.5th 6.1 The Complag WordPress plugin up to version 1.0.2 contains a reflected cross-site scripting (XSS) vul
2404 CVE-2025-13988
0.13%
32.5th 6.1 The 评论小秘书 WordPress plugin has a reflected cross-site scripting vulnerability that allows
2405 CVE-2025-13892
0.13%
32.5th 6.1 The MG AdvancedOptions WordPress plugin contains a reflected cross-site scripting (XSS) vulnerabilit
2406 CVE-2025-13701
0.13%
32.5th 6.1 The Shabat Keeper WordPress plugin contains a reflected cross-site scripting (XSS) vulnerability tha
2407 CVE-2025-13895
0.13%
32.5th 6.1 The Top Position Google Finance WordPress plugin has a reflected cross-site scripting vulnerability
2408 CVE-2025-14130
0.13%
32.5th 6.1 The Post Like Dislike WordPress plugin contains a reflected cross-site scripting (XSS) vulnerability
2409 CVE-2026-1246
0.13%
32.4th 4.9 The ShortPixel Image Optimizer WordPress plugin contains a path traversal vulnerability that allows
2410 CVE-2025-22150
0.13%
32.3th 6.8 This vulnerability in Undici's multipart/form-data boundary generation allows attackers to predict a
2411 CVE-2022-22363
0.13%
32.4th 4.3 CVE-2022-22363 is an information disclosure vulnerability in IBM Cognos Controller and IBM Controlle
2412 CVE-2024-11496
0.13%
32.4th 6.5 The Infility Global WordPress plugin has a missing capability check that allows authenticated users
2413 CVE-2024-47260
0.13%
32.4th 6.5 This vulnerability in Axis devices allows attackers to upload excessive audio clips through the VAPI
2414 CVE-2025-26153
0.13%
32.4th 5.4 A stored cross-site scripting (XSS) vulnerability in Chamilo LMS 1.11.28 allows attackers to inject
2415 CVE-2025-32227
0.13%
32.4th 4.3 This vulnerability allows attackers to bypass authentication in Asgaros Forum WordPress plugin by sp
2416 CVE-2025-3165
0.13%
32.4th 5.3 This vulnerability allows local attackers to execute arbitrary code through unsafe deserialization i
2417 CVE-2025-20193
0.13%
32.4th 6.5 This vulnerability allows authenticated low-privileged remote attackers to perform OS command inject
2418 CVE-2025-4222
0.13%
32.3th 5.9 The Database Toolset WordPress plugin stores database backup files in a publicly accessible director
2419 CVE-2025-58474
0.13%
32.4th 5.3 This vulnerability affects BIG-IP Advanced WAF with SSRF protection or NGINX with App Protect Bot De
2420 CVE-2025-11380
0.13%
32.4th 5.9 The Everest Backup WordPress plugin has an authentication bypass vulnerability that allows unauthent
2421 CVE-2025-60313
0.13%
32.4th 6.1 CVE-2025-60313 is a Cross-Site Scripting (XSS) vulnerability in Sourcecodester Link Status Checker 1
2422 CVE-2026-22808
0.13%
32.4th 5.4 This is a cross-site scripting (XSS) vulnerability in Fleet device management software that allows u
2423 CVE-2025-10753
0.13%
32.4th 5.3 The OAuth Single Sign On plugin for WordPress has an authentication bypass vulnerability that allows
2424 CVE-2025-14461
0.13%
32.4th 5.3 The Xendit Payment plugin for WordPress has an authentication bypass vulnerability that allows unaut
2425 CVE-2024-12203
0.13%
32.3th 4.4 The RSS Icon Widget plugin for WordPress has a stored cross-site scripting vulnerability in the 'lin
2426 CVE-2024-37518
0.13%
32.2th 4.3 This CSRF vulnerability in The Events Calendar WordPress plugin allows attackers to trick authentica
2427 CVE-2024-37493
0.13%
32.2th 4.3 This CSRF vulnerability in the Posterity WordPress theme allows attackers to trick authenticated adm
2428 CVE-2024-37490
0.13%
32.2th 4.3 A Cross-Site Request Forgery (CSRF) vulnerability in the WP Royal Bard WordPress theme allows attack
2429 CVE-2024-37467
0.13%
32.2th 4.3 This CSRF vulnerability in the Hestia WordPress theme allows attackers to trick authenticated admini
2430 CVE-2024-37238
0.13%
32.2th 4.3 This CSRF vulnerability in the WPAdverts WordPress plugin allows attackers to trick authenticated ad
2431 CVE-2024-47067
0.13%
32.2th 6.1 AList file management software contains a reflected cross-site scripting vulnerability where user in
2432 CVE-2025-3571
0.13%
32.2th 6.3 This critical SQL injection vulnerability in Fannuo Enterprise Content Management System allows remo
2433 CVE-2025-3382
0.13%
32.2th 6.3 This critical SQL injection vulnerability in joey-zhou's xiaozhi-esp32-server-java allows remote att
2434 CVE-2025-3158
0.13%
32.2th 5.3 A critical heap-based buffer overflow vulnerability exists in Assimp's LWO file handler. Attackers c
2435 CVE-2025-25007
0.13%
32.3th 5.3 This vulnerability in Microsoft Exchange Server allows unauthorized attackers to perform spoofing at
2436 CVE-2025-54879
0.13%
32.2th 5.3 This vulnerability allows attackers to bypass email confirmation rate limits in Mastodon by rotating
2437 CVE-2025-8517
0.13%
32.3th 6.3 This CVE describes a session fixation vulnerability in givanz Vvveb CMS version 1.0.6.1 that allows
2438 CVE-2025-61766
0.13%
32.2th 6.5 The Bucket MediaWiki extension prior to version 1.0.0 contains an infinite recursion vulnerability w
2439 CVE-2025-14748
0.13%
32.2th 5.4 This vulnerability in Ningyuanda TC155 57.0.2.0 allows attackers on the local network to perform una
2440 CVE-2025-62852
0.13%
32.2th 6.5 A buffer overflow vulnerability in QNAP operating systems allows remote attackers with administrator
2441 CVE-2025-53597
0.13%
32.2th 6.5 A buffer overflow vulnerability in QNAP License Center allows authenticated administrators to modify
2442 CVE-2025-48721
0.13%
32.2th 6.5 A buffer overflow vulnerability in QNAP operating systems allows remote attackers with administrator
2443 CVE-2025-53593
0.13%
32.2th 6.5 A buffer overflow vulnerability in QNAP operating systems allows remote attackers with administrator
2444 CVE-2025-0693
0.13%
32th 5.3 This vulnerability in AWS Sign-in allows attackers to use timing differences in IAM user login respo
2445 CVE-2025-0541
0.13%
32th 6.3 CVE-2025-0541 is a critical SQL injection vulnerability in Codezips Gym Management System 1.0 that a
2446 CVE-2025-0535
0.13%
32th 6.3 This critical SQL injection vulnerability in Codezips Gym Management System 1.0 allows remote attack
2447 CVE-2025-0532
0.13%
32th 6.3 CVE-2025-0532 is a critical SQL injection vulnerability in Codezips Gym Management System 1.0 that a
2448 CVE-2025-1183
0.13%
32th 6.3 This critical SQL injection vulnerability in CodeZips Gym Management System 1.0 allows attackers to
2449 CVE-2025-24852
0.13%
32th 4.6 This vulnerability in CHOCO TEI WATCHER mini cameras allows attackers who gain physical access to th
2450 CVE-2025-2217
0.13%
32th 6.3 This critical SQL injection vulnerability in zzskzy Warehouse Refinement Management System 1.3 allow

What is EPSS?

The Exploit Prediction Scoring System (EPSS) is a data-driven model developed by FIRST.org that estimates the probability a CVE will be exploited in the wild within the next 30 days. Unlike CVSS which measures severity, EPSS measures likelihood of exploitation — making it ideal for prioritizing which vulnerabilities to patch first.

Why EPSS matters: With thousands of CVEs published monthly, not all vulnerabilities are equally dangerous. EPSS helps security teams focus on the CVEs most likely to be actively exploited, rather than patching solely by CVSS score. A critical CVSS 9.8 vulnerability with 0.1% EPSS may be less urgent than a high CVSS 7.5 with 90% EPSS.

Prioritize by Exploit Risk

Scan your servers and see which vulnerabilities have the highest EPSS scores. Focus on what attackers are actually targeting.

Start Monitoring Free