Most Exploitable CVEs - EPSS Rankings

CVEs ranked by EPSS (Exploit Prediction Scoring System) probability. Higher scores mean a greater likelihood of exploitation in the wild within the next 30 days.

164
EPSS > 50%
156
CISA KEV Listed
35,468
CVEs with EPSS
0.7%
Avg EPSS Score
All Critical High Medium Low
Rank CVE ID EPSS Score Percentile CVSS Flags Summary
2551 CVE-2025-22247
0.12%
31.2th 6.1 CVE-2025-22247 is an insecure file handling vulnerability in VMware Tools that allows non-administra
2552 CVE-2025-41665
0.12%
31.4th 6.5 An attacker with low-privileged remote access can trigger a watchdog reboot on affected PLC devices
2553 CVE-2025-51502
0.12%
31.2th 6.1 This vulnerability allows attackers to inject malicious JavaScript via the layout parameter on the a
2554 CVE-2025-11042
0.12%
31.3th 4.3 This vulnerability in GitLab allows attackers to execute specific GraphQL queries that cause uncontr
2555 CVE-2025-12250
0.12%
31.4th 4.7 CVE-2025-12250 is a path traversal vulnerability in OpenWGA 7.11.12 Build 737 that allows attackers
2556 CVE-2025-54266
0.12%
31.3th 4.8 A stored cross-site scripting (XSS) vulnerability in Adobe Commerce allows high-privileged attackers
2557 CVE-2025-8682
0.12%
31.2th 4.3 The Newsup WordPress theme has a vulnerability that allows unauthenticated attackers to install the
2558 CVE-2025-14521
0.12%
31.2th 4.3 This CVE describes a path traversal vulnerability in baowzh hfly's admin interface that allows attac
2559 CVE-2024-13257
0.12%
31.2th 5.3 This CVE describes an incorrect authorization vulnerability in Drupal Commerce View Receipt that all
2560 CVE-2025-25510
0.12%
31.2th 6.5 A buffer overflow vulnerability in Tenda AC8 routers allows attackers to execute arbitrary code or c
2561 CVE-2024-36508
0.12%
31.2th 6.0 This path traversal vulnerability in Fortinet FortiManager and FortiAnalyzer allows authenticated ad
2562 CVE-2025-0630
0.12%
31.1th 6.5 This vulnerability allows any authenticated user on affected Western Telematic (WTI) products to per
2563 CVE-2024-56946
0.12%
31.2th 5.3 This vulnerability in Technitium DNS Server allows remote attackers to cause a denial of service by
2564 CVE-2024-11134
0.12%
31.1th 4.3 The Eventer WordPress plugin has an authorization vulnerability that allows authenticated users with
2565 CVE-2025-31076
0.12%
31.2th 4.9 This Server-Side Request Forgery (SSRF) vulnerability in WP Compress for MainWP allows attackers to
2566 CVE-2025-2686
0.12%
31.2th 6.5 This CVE describes an improper access control vulnerability in the mingyuefusu library management sy
2567 CVE-2025-29768
0.12%
31.2th 4.4 Vim versions before 9.1.1198 contain a vulnerability in zip.vim that could cause data loss when user
2568 CVE-2025-0877
0.12%
31.1th 4.7 This CVE describes a cross-site scripting (XSS) vulnerability in the AtaksAPP Reservation Management
2569 CVE-2025-25634
0.12%
31.2th 6.5 A stack-based buffer overflow vulnerability exists in Tenda AC15 routers version 15.03.05.19. Attack
2570 CVE-2025-4087
0.12%
31.1th 4.8 This vulnerability in Thunderbird and Firefox allows attackers to trigger undefined behavior through
2571 CVE-2025-4036
0.12%
31.1th 6.3 This CVE describes an authorization bypass vulnerability in Novel 3.5.0 that allows attackers to rem
2572 CVE-2025-32691
0.12%
31.2th 4.9 This Server-Side Request Forgery (SSRF) vulnerability in the PowerPress Podcasting WordPress plugin
2573 CVE-2025-32487
0.12%
31.2th 4.9 This Server-Side Request Forgery (SSRF) vulnerability in the Waymark WordPress plugin allows attacke
2574 CVE-2024-57338
0.12%
31.1th 6.5 This vulnerability allows attackers to upload malicious files to M2Soft CROWNIX Report & ERS systems
2575 CVE-2024-51444
0.12%
31.2th 6.5 This SQL injection vulnerability in Siemens Polarion allows authenticated remote attackers to bypass
2576 CVE-2025-3264
0.12%
31.1th 5.3 A Regular Expression Denial of Service (ReDoS) vulnerability in Hugging Face Transformers library al
2577 CVE-2025-37158
0.12%
31.1th 6.7 A command injection vulnerability in the AOS-CX Operating System allows authenticated remote attacke
2578 CVE-2025-37157
0.12%
31.1th 6.7 A command injection vulnerability in AOS-CX Operating System allows authenticated remote attackers t
2579 CVE-2025-12177
0.12%
31.1th 5.3 The Download Manager WordPress plugin contains a hardcoded cron key vulnerability that allows unauth
2580 CVE-2025-12908
0.12%
31.1th 5.4 This vulnerability allows attackers to spoof domains in Chrome for Android downloads by tricking use
2581 CVE-2025-12350
0.12%
31.1th 5.3 The DominoKit WordPress plugin has an authentication bypass vulnerability that allows unauthenticate
2582 CVE-2025-10304
0.12%
31.1th 5.3 The Everest Backup WordPress plugin has an authentication bypass vulnerability that allows unauthent
2583 CVE-2025-67090
0.12%
31.1th 5.1 The LuCI web interface on GL.Inet AX1800 routers lacks rate limiting or account lockout mechanisms o
2584 CVE-2024-13380
0.12%
30.9th 6.4 This stored XSS vulnerability in the Alex Reservations WordPress plugin allows authenticated attacke
2585 CVE-2025-0369
0.12%
30.9th 6.4 The JetEngine WordPress plugin has a stored XSS vulnerability in the 'list_tag' parameter that allow
2586 CVE-2025-22787
0.12%
31th 4.3 This CVE describes a missing authorization vulnerability in the Button Block WordPress plugin that a
2587 CVE-2024-47566
0.12%
31th 5.1 This path traversal vulnerability in Fortinet FortiRecorder allows privileged attackers to delete ar
2588 CVE-2024-13156
0.12%
31th 6.4 This vulnerability allows authenticated WordPress users with Contributor-level access or higher to i
2589 CVE-2025-26911
0.12%
31th 4.3 The Bowo System Dashboard WordPress plugin exposes sensitive system information to unauthorized user
2590 CVE-2024-13462
0.12%
30.9th 6.4 The WP Wiki Tooltip WordPress plugin has a stored XSS vulnerability that allows authenticated attack
2591 CVE-2024-11778
0.12%
30.9th 6.4 This vulnerability allows authenticated WordPress users with contributor-level access or higher to i
2592 CVE-2025-24436
0.12%
31th 4.3 Adobe Commerce has an incorrect authorization vulnerability that allows low-privileged attackers to
2593 CVE-2025-24421
0.12%
31th 4.3 Adobe Commerce has an incorrect authorization vulnerability that allows low-privileged attackers to
2594 CVE-2025-2108
0.12%
30.9th 6.4 This stored XSS vulnerability in the Xpro Elementor Addons WordPress plugin allows authenticated att
2595 CVE-2024-5667
0.12%
30.9th 6.4 This CVE describes a stored cross-site scripting (XSS) vulnerability in multiple WordPress plugins t
2596 CVE-2025-1008
0.12%
30.9th 6.4 This stored XSS vulnerability in the Recently Purchased Products For Woo WordPress plugin allows aut
2597 CVE-2025-1491
0.12%
30.9th 6.4 The WP Posts Carousel WordPress plugin has a stored XSS vulnerability in versions up to 1.3.7. Authe
2598 CVE-2025-45019
0.12%
31th 5.4 A SQL injection vulnerability in PHPGurukul Park Ticketing Management System v2.0 allows remote atta
2599 CVE-2025-35965
0.12%
31th 6.5 This vulnerability allows attackers to create task items with excessive actions via the UpdateRunTas
2600 CVE-2025-47294
0.12%
31th 5.3 An integer overflow vulnerability in Fortinet FortiOS allows remote unauthenticated attackers to cra

What is EPSS?

The Exploit Prediction Scoring System (EPSS) is a data-driven model developed by FIRST.org that estimates the probability a CVE will be exploited in the wild within the next 30 days. Unlike CVSS which measures severity, EPSS measures likelihood of exploitation — making it ideal for prioritizing which vulnerabilities to patch first.

Why EPSS matters: With thousands of CVEs published monthly, not all vulnerabilities are equally dangerous. EPSS helps security teams focus on the CVEs most likely to be actively exploited, rather than patching solely by CVSS score. A critical CVSS 9.8 vulnerability with 0.1% EPSS may be less urgent than a high CVSS 7.5 with 90% EPSS.

Prioritize by Exploit Risk

Scan your servers and see which vulnerabilities have the highest EPSS scores. Focus on what attackers are actually targeting.

Start Monitoring Free