Most Exploitable CVEs - EPSS Rankings

CVEs ranked by EPSS (Exploit Prediction Scoring System) probability. Higher scores mean a greater likelihood of exploitation in the wild within the next 30 days.

164
EPSS > 50%
156
CISA KEV Listed
35,468
CVEs with EPSS
0.7%
Avg EPSS Score
All Critical High Medium Low
Rank CVE ID EPSS Score Percentile CVSS Flags Summary
201 CVE-2025-55911
1.21%
78.6th 6.5 This vulnerability in ClipBucket v5.5.2 Build#90 allows remote attackers to execute arbitrary code v
202 CVE-2024-57522
1.21%
78.6th 6.4 This vulnerability allows attackers to inject malicious scripts into username or name fields during
203 CVE-2025-28906
1.17%
78.3th 5.9 This stored cross-site scripting (XSS) vulnerability in the Skitter Slideshow WordPress plugin allow
204 CVE-2025-30293
1.17%
78.3th 6.8 This CVE describes an Improper Input Validation vulnerability in Adobe ColdFusion that allows high-p
205 CVE-2025-4851
1.16%
78.3th 6.3 This critical vulnerability in TOTOLINK N300RH routers allows remote attackers to execute arbitrary
206 CVE-2025-4849
1.16%
78.3th 6.3 This critical vulnerability in TOTOLINK N300RH routers allows remote attackers to execute arbitrary
207 CVE-2025-14155
1.15%
78.2th 5.3 This vulnerability allows unauthenticated attackers to view private, draft, and pending Elementor te
208 CVE-2024-13815
1.15%
78.1th 6.5 The Listingo WordPress theme allows unauthenticated attackers to execute arbitrary shortcodes due to
209 CVE-2025-0818
1.13%
77.9th 6.5 This CVE describes a directory traversal vulnerability in elFinder versions 2.1.64 and prior when us
210 CVE-2025-32052
1.12%
77.8th 6.5 A heap buffer over-read vulnerability exists in libsoup's sniff_unknown() function, which could allo
211 CVE-2025-0365
1.11%
77.8th 6.5 The Jupiter X Core WordPress plugin contains a directory traversal vulnerability in its inline SVG f
212 CVE-2024-13998
1.1%
77.6th 6.5 Nagios XI versions before 2024R1.1.3 allow authenticated users to access sensitive user account info
213 CVE-2025-55144
1.09%
77.6th 5.4 This CVE describes a missing authorization vulnerability in Ivanti secure access products that allow
214 CVE-2024-10585
1.09%
77.6th 5.3 The InfiniteWP Client WordPress plugin contains a path traversal vulnerability that allows unauthent
215 CVE-2025-24194
1.07%
77.4th 6.5 This CVE describes a memory disclosure vulnerability in Apple's web content processing across multip
216 CVE-2025-12000
1.07%
77.4th 6.5 The WPFunnels WordPress plugin contains an arbitrary file deletion vulnerability that allows authent
217 CVE-2024-11974
1.07%
77.4th 6.1 This vulnerability allows unauthenticated attackers to perform reflected cross-site scripting (XSS)
218 CVE-2025-3577
1.07%
77.4th 4.9 This path traversal vulnerability in Zyxel AMG1302-T10B firmware allows authenticated administrators
219 CVE-2024-13492
1.06%
77.3th 6.1 The Guten Free Options WordPress plugin through version 0.9.5 contains a reflected cross-site script
220 CVE-2024-13557
1.06%
77.3th 6.5 The Shortcodes by United Themes WordPress plugin allows unauthenticated attackers to execute arbitra
221 CVE-2023-0676
1.06%
77.3th 6.1 This CVE describes a reflected cross-site scripting (XSS) vulnerability in phpIPAM versions prior to
222 CVE-2024-10047
1.06%
77.3th 5.3 This vulnerability allows attackers to list arbitrary directories on Windows systems running vulnera
223 CVE-2024-40673
1.06%
77.2th 6.5 This vulnerability in Android's ZipFile.java allows attackers to execute arbitrary code by manipulat
224 CVE-2025-2916
1.05%
77.2th 6.3 This critical vulnerability in Aishida Call Center System allows remote attackers to execute arbitra
225 CVE-2025-24996
1.05%
77.1th 6.5 This vulnerability in Windows NTLM allows attackers to manipulate file paths or names during network
226 CVE-2025-31121
1.04%
77.1th 5.4 OpenEMR versions before 7.0.3.1 contain a cross-site scripting vulnerability in the Patient Image fe
227 CVE-2025-47827
1.04%
77th 4.6 KEV This vulnerability allows attackers to bypass Secure Boot protection in IGEL OS by exploiting improp
228 CVE-2025-47423
1.03%
77th 5.8 This vulnerability allows unauthenticated remote attackers to read arbitrary files on servers runnin
229 CVE-2022-50950
1.03%
77th 6.5 Webile 1.0.1 contains an unauthenticated directory traversal vulnerability that allows attackers to
230 CVE-2025-11523
1.03%
76.9th 6.3 This vulnerability in Tenda AC7 routers allows remote attackers to execute arbitrary commands throug
231 CVE-2024-56408
1.03%
76.9th 5.4 This CVE describes a cross-site scripting (XSS) vulnerability in PhpSpreadsheet's sample engineering
232 CVE-2025-7614
1.03%
76.9th 6.3 This critical vulnerability in TOTOLINK T6 routers allows remote attackers to execute arbitrary comm
233 CVE-2025-60671
1.03%
76.9th 5.4 A command injection vulnerability in D-Link DIR-823G router firmware allows attackers with write acc
234 CVE-2025-1310
1.01%
76.8th 6.5 The Jobs for WordPress plugin contains a directory traversal vulnerability that allows authenticated
235 CVE-2025-7524
1.01%
76.7th 6.3 This critical vulnerability in TOTOLINK T6 routers allows remote attackers to execute arbitrary comm
236 CVE-2025-2855
1.01%
76.7th 4.7 A deserialization vulnerability in elunez eladmin's file upload function allows remote attackers to
237 CVE-2025-31672
1.01%
76.6th 5.3 This vulnerability allows attackers to create malicious OOXML files (like Excel, Word, or PowerPoint
238 CVE-2023-6786
0.99%
76.5th 6.1 The Payment Gateway for Telcell WordPress plugin through version 2.0.1 contains an open redirect vul
239 CVE-2025-29522
0.99%
76.5th 6.5 This CVE describes a command injection vulnerability in D-Link DSL-7740C routers that allows authent
240 CVE-2024-11369
0.99%
76.4th 6.1 This vulnerability allows unauthenticated attackers to perform reflected cross-site scripting (XSS)
241 CVE-2025-1785
0.98%
76.3th 5.4 The Download Manager plugin for WordPress has a directory traversal vulnerability that allows authen
242 CVE-2024-57212
0.97%
76.3th 5.1 This CVE describes a command injection vulnerability in TOTOLINK A6000R routers that allows attacker
243 CVE-2024-13727
0.97%
76.3th 6.1 This vulnerability in the MemberSpace WordPress plugin allows attackers to inject malicious scripts
244 CVE-2026-0581
0.97%
76.2th 6.3 This CVE describes a command injection vulnerability in Tenda AC1206 routers that allows remote atta
245 CVE-2023-42229
0.95%
76th 6.5 Pat Infinite Solutions HelpdeskAdvanced versions up to 11.0.33 contain a directory traversal vulnera
246 CVE-2024-12221
0.95%
75.9th 6.1 The Turnkey bbPress by WeaverTheme WordPress plugin contains a reflected cross-site scripting (XSS)
247 CVE-2025-55177
0.95%
75.9th 5.4 KEV This WhatsApp vulnerability allows unauthorized users to trigger processing of arbitrary URLs on a t
248 CVE-2024-11681
0.94%
75.9th 6.8 This vulnerability allows a malicious or compromised MacPorts mirror to execute arbitrary commands w
249 CVE-2024-12738
0.94%
75.9th 6.1 This vulnerability allows unauthenticated attackers to inject malicious scripts into WordPress user
250 CVE-2025-29519
0.94%
75.8th 5.3 A command injection vulnerability in D-Link DSL-7740C routers allows attackers to execute arbitrary

What is EPSS?

The Exploit Prediction Scoring System (EPSS) is a data-driven model developed by FIRST.org that estimates the probability a CVE will be exploited in the wild within the next 30 days. Unlike CVSS which measures severity, EPSS measures likelihood of exploitation — making it ideal for prioritizing which vulnerabilities to patch first.

Why EPSS matters: With thousands of CVEs published monthly, not all vulnerabilities are equally dangerous. EPSS helps security teams focus on the CVEs most likely to be actively exploited, rather than patching solely by CVSS score. A critical CVSS 9.8 vulnerability with 0.1% EPSS may be less urgent than a high CVSS 7.5 with 90% EPSS.

Prioritize by Exploit Risk

Scan your servers and see which vulnerabilities have the highest EPSS scores. Focus on what attackers are actually targeting.

Start Monitoring Free