Most Exploitable CVEs - EPSS Rankings
CVEs ranked by EPSS (Exploit Prediction Scoring System) probability. Higher scores mean a greater likelihood of exploitation in the wild within the next 30 days.
| Rank | CVE ID | EPSS Score | Percentile | CVSS | Flags | Summary |
|---|---|---|---|---|---|---|
| 2651 | CVE-2025-65897 |
|
63.9th | 8.8 | This vulnerability in zdh_web allows authenticated users to upload arbitrary files to any location o | |
| 2652 | CVE-2025-70161 |
|
63.9th | 9.8 | EDIMAX BR-6208AC V2 router firmware version 1.02 contains a command injection vulnerability in the p | |
| 2653 | CVE-2024-11356 |
|
63.9th | 6.1 | The tourmaster WordPress plugin before version 5.3.4 contains a cross-site scripting (XSS) vulnerabi | |
| 2654 | CVE-2025-30160 |
|
63.9th | 7.5 | Redlib versions before 0.36.0 contain a vulnerability where attackers can cause denial-of-service by | |
| 2655 | CVE-2025-59340 |
|
63.8th | 9.8 | CVE-2025-59340 is a critical deserialization vulnerability in jinjava that allows attackers to bypas | |
| 2656 | CVE-2025-57633 |
|
63.8th | 9.8 | This CVE describes a critical command injection vulnerability in FTP-Flask-python that allows unauth | |
| 2657 | CVE-2026-21893 |
|
63.9th | 7.2 | A command injection vulnerability in n8n's community package installation functionality allows authe | |
| 2658 | CVE-2025-24126 |
|
63.8th | 7.3 | This CVE describes an input validation vulnerability in multiple Apple operating systems that could | |
| 2659 | CVE-2024-12922 |
|
63.8th | 9.8 | The Altair WordPress theme has a critical vulnerability that allows unauthenticated attackers to mod | |
| 2660 | CVE-2024-12805 |
|
63.8th | 7.2 | A post-authentication format string vulnerability in SonicOS management interface allows authenticat | |
| 2661 | CVE-2025-29975 |
|
63.7th | 7.8 | This vulnerability allows an authorized attacker to exploit improper link resolution in Microsoft PC | |
| 2662 | CVE-2025-34280 |
|
63.7th | 7.2 | This vulnerability allows authenticated administrators in Nagios Network Analyzer to execute arbitra | |
| 2663 | CVE-2025-10051 |
|
63.8th | 7.2 | The Demo Import Kit WordPress plugin allows authenticated attackers with Administrator privileges to | |
| 2664 | CVE-2024-48013 |
|
63.7th | 8.8 | Dell SmartFabric OS10 Software contains an execution with unnecessary privileges vulnerability that | |
| 2665 | CVE-2025-45947 |
|
63.6th | 9.8 | This vulnerability allows remote attackers to execute arbitrary code on systems running phpgurukul O | |
| 2666 | CVE-2025-32953 |
|
63.6th | 8.7 | This vulnerability in z80pack's GitHub Actions workflow exposes the repository's GITHUB_TOKEN in pub | |
| 2667 | CVE-2025-23121 |
|
63.6th | 8.8 | This vulnerability allows authenticated domain users to execute arbitrary code on Veeam Backup Serve | |
| 2668 | CVE-2025-0477 |
|
63.6th | 9.8 | A critical encryption vulnerability in Rockwell Automation FactoryTalk AssetCentre allows attackers | |
| 2669 | CVE-2025-1414 |
|
63.6th | 6.5 | CVE-2025-1414 is a memory safety vulnerability in Firefox that could allow attackers to corrupt memo | |
| 2670 | CVE-2025-7710 |
|
63.6th | 9.8 | The Brave Conversion Engine (PRO) WordPress plugin has an authentication bypass vulnerability that a | |
| 2671 | CVE-2022-50792 |
|
63.6th | 7.5 | This vulnerability allows remote attackers to read arbitrary files on SOUND4 IMPACT/FIRST/PULSE/Eco | |
| 2672 | CVE-2025-25616 |
|
63.6th | 4.3 | Unifiedtransform 2.0 has an access control vulnerability that allows students to modify exam rules t | |
| 2673 | CVE-2024-43243 |
|
63.5th | 10.0 | This vulnerability allows attackers to upload arbitrary files, including web shells, to WordPress se | |
| 2674 | CVE-2025-3011 |
|
63.5th | 9.8 | CVE-2025-3011 is a critical SQL injection vulnerability in SOOP-CLM from PiExtract that allows unaut | |
| 2675 | CVE-2025-30211 |
|
63.5th | 7.5 | This vulnerability in Erlang/OTP allows attackers to cause denial of service through memory exhausti | |
| 2676 | CVE-2025-27603 |
|
63.5th | 9.1 | This vulnerability in XWiki Confluence Migrator Pro allows unprivileged users without programming ri | |
| 2677 | CVE-2025-2558 |
|
63.5th | 8.6 | CVE-2025-2558 is a Local File Inclusion vulnerability in The-wound WordPress theme that allows unaut | |
| 2678 | CVE-2024-12177 |
|
63.4th | 6.1 | The Ai Image Alt Text Generator for WP WordPress plugin contains a reflected cross-site scripting (X | |
| 2679 | CVE-2025-0860 |
|
63.4th | 6.1 | The VR-Frases WordPress plugin is vulnerable to Reflected Cross-Site Scripting (XSS) that allows una | |
| 2680 | CVE-2024-13739 |
|
63.4th | 6.1 | This vulnerability allows unauthenticated attackers to inject malicious scripts via the 'to' paramet | |
| 2681 | CVE-2025-2077 |
|
63.4th | 6.1 | The Simple Amazon Affiliate WordPress plugin has a reflected cross-site scripting (XSS) vulnerabilit | |
| 2682 | CVE-2025-29953 |
|
63.4th | 9.8 | This vulnerability allows malicious Apache ActiveMQ servers to send specially crafted responses to N | |
| 2683 | CVE-2025-27188 |
|
63.4th | 4.3 | CVE-2025-27188 is an improper authorization vulnerability in Adobe Commerce that allows attackers to | |
| 2684 | CVE-2025-31827 |
|
63.4th | 4.9 | This path traversal vulnerability in the Fonto WordPress plugin allows attackers to download arbitra | |
| 2685 | CVE-2024-13693 |
|
63.3th | 5.3 | The Enfold WordPress theme has an authorization bypass vulnerability that allows unauthenticated att | |
| 2686 | CVE-2024-12470 |
|
63.3th | 9.8 | The SakolaWP WordPress plugin allows unauthenticated attackers to register as administrative users d | |
| 2687 | CVE-2025-25373 |
|
63.3th | 9.8 | The Memory Management Module in NASA cFS Aquila has insecure permissions that allow attackers to gai | |
| 2688 | CVE-2025-21434 |
|
63.3th | 7.5 | This vulnerability allows a denial-of-service (DoS) condition in Wi-Fi systems when parsing EHT (Ext | |
| 2689 | CVE-2025-63958 |
|
63.3th | 9.8 | MILLENSYS Vision Tools Workspace 6.5.0.2585 exposes an unauthenticated configuration endpoint that l | |
| 2690 | CVE-2025-48780 |
|
63.3th | 9.8 | A critical deserialization vulnerability in Soar Cloud HRD Human Resource Management System allows r | |
| 2691 | CVE-2024-55605 |
|
63.3th | 7.5 | This vulnerability in Suricata allows attackers to cause a denial-of-service by sending specially cr | |
| 2692 | CVE-2025-25362 |
|
63.3th | 9.8 | This Server-Side Template Injection (SSTI) vulnerability in Spacy-LLM v0.7.2 allows attackers to exe | |
| 2693 | CVE-2025-58159 |
|
63.3th | 9.9 | CVE-2025-58159 is a critical remote code execution vulnerability in WeGIA web management software fo | |
| 2694 | CVE-2025-68155 |
|
63.3th | 7.5 | This vulnerability in @vitejs/plugin-rsc allows unauthenticated attackers to read arbitrary files ac | |
| 2695 | CVE-2021-47727 |
|
63.3th | 5.3 | Selea Targa IP OCR-ANPR cameras contain an unauthenticated vulnerability that allows remote attacker | |
| 2696 | CVE-2021-47851 |
|
63.3th | 9.8 | Mini Mouse 9.2.0 contains an unauthenticated remote code execution vulnerability that allows attacke | |
| 2697 | CVE-2024-13698 |
|
63.2th | 6.5 | The Jobify WordPress theme has missing capability checks that allow unauthenticated attackers to mak | |
| 2698 | CVE-2025-1361 |
|
63.2th | 7.5 | The IP2Location Country Blocker WordPress plugin exposes sensitive configuration settings to unauthe | |
| 2699 | CVE-2025-24269 |
|
63.2th | 9.8 | This is a critical memory handling vulnerability in macOS that allows an application to cause a syst | |
| 2700 | CVE-2025-24263 |
|
63.2th | 9.8 | This CVE describes a macOS privacy vulnerability where applications could access unprotected user da |
What is EPSS?
The Exploit Prediction Scoring System (EPSS) is a data-driven model developed by FIRST.org that estimates the probability a CVE will be exploited in the wild within the next 30 days. Unlike CVSS which measures severity, EPSS measures likelihood of exploitation — making it ideal for prioritizing which vulnerabilities to patch first.
Why EPSS matters: With thousands of CVEs published monthly, not all vulnerabilities are equally dangerous. EPSS helps security teams focus on the CVEs most likely to be actively exploited, rather than patching solely by CVSS score. A critical CVSS 9.8 vulnerability with 0.1% EPSS may be less urgent than a high CVSS 7.5 with 90% EPSS.
Prioritize by Exploit Risk
Scan your servers and see which vulnerabilities have the highest EPSS scores. Focus on what attackers are actually targeting.
Start Monitoring Free