Most Exploitable CVEs - EPSS Rankings
CVEs ranked by EPSS (Exploit Prediction Scoring System) probability. Higher scores mean a greater likelihood of exploitation in the wild within the next 30 days.
| Rank | CVE ID | EPSS Score | Percentile | CVSS | Flags | Summary |
|---|---|---|---|---|---|---|
| 2501 | CVE-2025-27133 |
|
65.2th | 8.8 | This SQL injection vulnerability in WeGIA allows authenticated attackers to execute arbitrary SQL qu | |
| 2502 | CVE-2025-24902 |
|
65.2th | 8.8 | A SQL injection vulnerability in WeGIA's salvar_cargo.php endpoint allows authenticated attackers to | |
| 2503 | CVE-2025-1800 |
|
65.2th | 6.3 | This critical vulnerability in D-Link DAR-7000 allows remote attackers to execute arbitrary commands | |
| 2504 | CVE-2025-4635 |
|
65.2th | 6.6 | This vulnerability allows an authenticated administrator in the web portal to manipulate the Diagnos | |
| 2505 | CVE-2025-23319 |
|
65.2th | 8.1 | NVIDIA Triton Inference Server's Python backend has a buffer overflow vulnerability where specially | |
| 2506 | CVE-2025-5622 |
|
65.2th | 9.8 | This critical vulnerability in D-Link DIR-816 routers allows remote attackers to execute arbitrary c | |
| 2507 | CVE-2021-47758 |
|
65.2th | 8.8 | CVE-2021-47758 allows authenticated attackers to upload malicious PHP plugins through Chikitsa Patie | |
| 2508 | CVE-2024-13353 |
|
65.1th | 8.8 | This vulnerability allows authenticated attackers with Contributor-level access or higher to perform | |
| 2509 | CVE-2025-26670 |
|
65.1th | 8.1 | A use-after-free vulnerability in Windows LDAP allows unauthorized attackers to execute arbitrary co | |
| 2510 | CVE-2025-64050 |
|
65.1th | 7.2 | A Remote Code Execution vulnerability in REDAXO CMS 5.20.0 allows authenticated administrators to in | |
| 2511 | CVE-2025-3266 |
|
65.1th | 7.3 | A critical stack-based buffer overflow vulnerability exists in qinguoyi TinyWebServer versions up to | |
| 2512 | CVE-2025-5000 |
|
65.1th | 6.3 | A critical command injection vulnerability in Linksys FGW3000 routers allows remote attackers to exe | |
| 2513 | CVE-2025-5396 |
|
65.1th | 9.8 | The Bears Backup plugin for WordPress has a critical Remote Code Execution vulnerability that allows | |
| 2514 | CVE-2025-50735 |
|
65.1th | 7.5 | A directory traversal vulnerability in NextChat's WebDAV proxy allows attackers to access sensitive | |
| 2515 | CVE-2025-34452 |
|
65.1th | N/A | This vulnerability in Streama allows authenticated attackers to write arbitrary files to the server | |
| 2516 | CVE-2025-25467 |
|
65.1th | 9.8 | This critical memory management vulnerability in libx264 allows attackers to execute arbitrary code | |
| 2517 | CVE-2024-9363 |
|
65th | 7.5 | An unauthenticated attacker can delete critical files like polyaxon.sock within Polyaxon containers, | |
| 2518 | CVE-2025-29788 |
|
65th | 6.5 | The Sylius PayPal Plugin vulnerability allows users to manipulate payment amounts by changing cart q | |
| 2519 | CVE-2025-30390 |
|
65.1th | 9.9 | This critical Azure vulnerability allows authenticated attackers to escalate privileges within cloud | |
| 2520 | CVE-2025-59358 |
|
65th | 7.5 | The Chaos Controller Manager in Chaos Mesh exposes an unauthenticated GraphQL debugging server that | |
| 2521 | CVE-2026-24897 |
|
65th | 10.0 | CVE-2026-24897 is a critical path traversal vulnerability in Erugo file-sharing platform that allows | |
| 2522 | CVE-2022-50939 |
|
65th | 7.2 | CVE-2022-50939 is a critical file upload vulnerability in e107 CMS version 3.2.1 that allows authent | |
| 2523 | CVE-2024-54449 |
|
65th | 8.8 | This vulnerability allows authenticated attackers with document read/write privileges to write arbit | |
| 2524 | CVE-2024-47571 |
|
64.9th | 8.1 | This vulnerability in Fortinet FortiManager allows attackers with valid credentials to gain improper | |
| 2525 | CVE-2023-51301 |
|
64.9th | 7.5 | This vulnerability allows attackers to send unlimited password reset requests for legitimate users i | |
| 2526 | CVE-2025-29908 |
|
64.9th | 5.3 | This vulnerability allows remote attackers to cause a Hash DoS attack by initiating QUIC connections | |
| 2527 | CVE-2025-24517 |
|
64.9th | 7.5 | A client-side authentication vulnerability in CHOCO TEI WATCHER mini (IB-MCT001) allows remote attac | |
| 2528 | CVE-2025-29803 |
|
64.9th | 7.3 | This vulnerability allows an authorized attacker to exploit an uncontrolled search path element in V | |
| 2529 | CVE-2025-27735 |
|
64.9th | 6.0 | This vulnerability allows an authorized attacker with local access to bypass security features in Wi | |
| 2530 | CVE-2025-29957 |
|
64.9th | 6.2 | This vulnerability in Windows Deployment Services allows an unauthorized attacker to cause a denial | |
| 2531 | CVE-2025-11750 |
|
64.9th | 5.3 | This vulnerability allows attackers to determine whether specific user accounts exist in langgenius/ | |
| 2532 | CVE-2025-69820 |
|
64.9th | 6.0 | A directory traversal vulnerability in Beam beta9 v0.1.521 allows remote attackers to access sensiti | |
| 2533 | CVE-2025-46612 |
|
64.8th | 7.2 | This vulnerability allows remote attackers to execute arbitrary commands on Airleader Master and Eas | |
| 2534 | CVE-2025-27142 |
|
64.8th | 8.8 | LocalSend versions before 1.17.0 have a path traversal vulnerability in file upload endpoints that a | |
| 2535 | CVE-2025-22867 |
|
64.8th | 7.5 | This vulnerability allows arbitrary code execution when building Go modules containing CGO on Darwin | |
| 2536 | CVE-2025-2751 |
|
64.8th | 4.3 | This vulnerability in Assimp's CSM file handler allows remote attackers to trigger an out-of-bounds | |
| 2537 | CVE-2024-7036 |
|
64.8th | 7.5 | An unauthenticated attacker can cause denial-of-service by submitting excessively large text in the | |
| 2538 | CVE-2025-3431 |
|
64.8th | 7.5 | This vulnerability allows unauthenticated attackers to read arbitrary files on WordPress servers run | |
| 2539 | CVE-2025-3302 |
|
64.8th | 7.2 | The Xagio SEO WordPress plugin has a stored XSS vulnerability in all versions up to 7.1.0.16. Unauth | |
| 2540 | CVE-2025-50739 |
|
64.8th | 9.8 | CVE-2025-50739 is a critical remote code execution vulnerability in iib0011 omni-tools v0.4.0 caused | |
| 2541 | CVE-2025-63406 |
|
64.8th | 8.8 | This vulnerability allows remote attackers to execute arbitrary code on GroupOffice installations vi | |
| 2542 | CVE-2024-11135 |
|
64.7th | 7.5 | The Eventer WordPress plugin contains an SQL injection vulnerability that allows unauthenticated att | |
| 2543 | CVE-2024-57590 |
|
64.7th | 9.8 | TRENDnet TEW-632BRP routers have a critical OS command injection vulnerability in the ntp_sync.cgi i | |
| 2544 | CVE-2024-13474 |
|
64.7th | 7.5 | This SQL injection vulnerability in the LTL Freight Quotes – Purolator Edition WordPress plugin al | |
| 2545 | CVE-2024-11260 |
|
64.7th | 7.5 | This SQL injection vulnerability in the WordPress Events Manager plugin allows unauthenticated attac | |
| 2546 | CVE-2024-13476 |
|
64.7th | 7.5 | This SQL injection vulnerability in the LTL Freight Quotes WordPress plugin allows unauthenticated a | |
| 2547 | CVE-2024-13534 |
|
64.7th | 7.5 | This SQL injection vulnerability in the Small Package Quotes – Worldwide Express Edition WordPress | |
| 2548 | CVE-2024-13491 |
|
64.7th | 7.5 | This SQL injection vulnerability in the Small Package Quotes – For Customers of FedEx WordPress pl | |
| 2549 | CVE-2025-26612 |
|
64.7th | 9.8 | CVE-2025-26612 is a critical SQL injection vulnerability in WeGIA's adicionar_almoxarife.php endpoin | |
| 2550 | CVE-2024-13480 |
|
64.7th | 7.5 | This SQL injection vulnerability in the LTL Freight Quotes WordPress plugin allows unauthenticated a |
What is EPSS?
The Exploit Prediction Scoring System (EPSS) is a data-driven model developed by FIRST.org that estimates the probability a CVE will be exploited in the wild within the next 30 days. Unlike CVSS which measures severity, EPSS measures likelihood of exploitation — making it ideal for prioritizing which vulnerabilities to patch first.
Why EPSS matters: With thousands of CVEs published monthly, not all vulnerabilities are equally dangerous. EPSS helps security teams focus on the CVEs most likely to be actively exploited, rather than patching solely by CVSS score. A critical CVSS 9.8 vulnerability with 0.1% EPSS may be less urgent than a high CVSS 7.5 with 90% EPSS.
Prioritize by Exploit Risk
Scan your servers and see which vulnerabilities have the highest EPSS scores. Focus on what attackers are actually targeting.
Start Monitoring Free