Most Exploitable CVEs - EPSS Rankings

CVEs ranked by EPSS (Exploit Prediction Scoring System) probability. Higher scores mean a greater likelihood of exploitation in the wild within the next 30 days.

164
EPSS > 50%
156
CISA KEV Listed
35,468
CVEs with EPSS
0.7%
Avg EPSS Score
All Critical High Medium Low
Rank CVE ID EPSS Score Percentile CVSS Flags Summary
2651 CVE-2025-65897
0.47%
63.9th 8.8 This vulnerability in zdh_web allows authenticated users to upload arbitrary files to any location o
2652 CVE-2025-70161
0.47%
63.9th 9.8 EDIMAX BR-6208AC V2 router firmware version 1.02 contains a command injection vulnerability in the p
2653 CVE-2024-11356
0.47%
63.9th 6.1 The tourmaster WordPress plugin before version 5.3.4 contains a cross-site scripting (XSS) vulnerabi
2654 CVE-2025-30160
0.47%
63.9th 7.5 Redlib versions before 0.36.0 contain a vulnerability where attackers can cause denial-of-service by
2655 CVE-2025-59340
0.47%
63.8th 9.8 CVE-2025-59340 is a critical deserialization vulnerability in jinjava that allows attackers to bypas
2656 CVE-2025-57633
0.47%
63.8th 9.8 This CVE describes a critical command injection vulnerability in FTP-Flask-python that allows unauth
2657 CVE-2026-21893
0.47%
63.9th 7.2 A command injection vulnerability in n8n's community package installation functionality allows authe
2658 CVE-2025-24126
0.47%
63.8th 7.3 This CVE describes an input validation vulnerability in multiple Apple operating systems that could
2659 CVE-2024-12922
0.47%
63.8th 9.8 The Altair WordPress theme has a critical vulnerability that allows unauthenticated attackers to mod
2660 CVE-2024-12805
0.46%
63.8th 7.2 A post-authentication format string vulnerability in SonicOS management interface allows authenticat
2661 CVE-2025-29975
0.46%
63.7th 7.8 This vulnerability allows an authorized attacker to exploit improper link resolution in Microsoft PC
2662 CVE-2025-34280
0.46%
63.7th 7.2 This vulnerability allows authenticated administrators in Nagios Network Analyzer to execute arbitra
2663 CVE-2025-10051
0.46%
63.8th 7.2 The Demo Import Kit WordPress plugin allows authenticated attackers with Administrator privileges to
2664 CVE-2024-48013
0.46%
63.7th 8.8 Dell SmartFabric OS10 Software contains an execution with unnecessary privileges vulnerability that
2665 CVE-2025-45947
0.46%
63.6th 9.8 This vulnerability allows remote attackers to execute arbitrary code on systems running phpgurukul O
2666 CVE-2025-32953
0.46%
63.6th 8.7 This vulnerability in z80pack's GitHub Actions workflow exposes the repository's GITHUB_TOKEN in pub
2667 CVE-2025-23121
0.46%
63.6th 8.8 This vulnerability allows authenticated domain users to execute arbitrary code on Veeam Backup Serve
2668 CVE-2025-0477
0.46%
63.6th 9.8 A critical encryption vulnerability in Rockwell Automation FactoryTalk AssetCentre allows attackers
2669 CVE-2025-1414
0.46%
63.6th 6.5 CVE-2025-1414 is a memory safety vulnerability in Firefox that could allow attackers to corrupt memo
2670 CVE-2025-7710
0.46%
63.6th 9.8 The Brave Conversion Engine (PRO) WordPress plugin has an authentication bypass vulnerability that a
2671 CVE-2022-50792
0.46%
63.6th 7.5 This vulnerability allows remote attackers to read arbitrary files on SOUND4 IMPACT/FIRST/PULSE/Eco
2672 CVE-2025-25616
0.46%
63.6th 4.3 Unifiedtransform 2.0 has an access control vulnerability that allows students to modify exam rules t
2673 CVE-2024-43243
0.46%
63.5th 10.0 This vulnerability allows attackers to upload arbitrary files, including web shells, to WordPress se
2674 CVE-2025-3011
0.46%
63.5th 9.8 CVE-2025-3011 is a critical SQL injection vulnerability in SOOP-CLM from PiExtract that allows unaut
2675 CVE-2025-30211
0.46%
63.5th 7.5 This vulnerability in Erlang/OTP allows attackers to cause denial of service through memory exhausti
2676 CVE-2025-27603
0.46%
63.5th 9.1 This vulnerability in XWiki Confluence Migrator Pro allows unprivileged users without programming ri
2677 CVE-2025-2558
0.46%
63.5th 8.6 CVE-2025-2558 is a Local File Inclusion vulnerability in The-wound WordPress theme that allows unaut
2678 CVE-2024-12177
0.46%
63.4th 6.1 The Ai Image Alt Text Generator for WP WordPress plugin contains a reflected cross-site scripting (X
2679 CVE-2025-0860
0.46%
63.4th 6.1 The VR-Frases WordPress plugin is vulnerable to Reflected Cross-Site Scripting (XSS) that allows una
2680 CVE-2024-13739
0.46%
63.4th 6.1 This vulnerability allows unauthenticated attackers to inject malicious scripts via the 'to' paramet
2681 CVE-2025-2077
0.46%
63.4th 6.1 The Simple Amazon Affiliate WordPress plugin has a reflected cross-site scripting (XSS) vulnerabilit
2682 CVE-2025-29953
0.46%
63.4th 9.8 This vulnerability allows malicious Apache ActiveMQ servers to send specially crafted responses to N
2683 CVE-2025-27188
0.46%
63.4th 4.3 CVE-2025-27188 is an improper authorization vulnerability in Adobe Commerce that allows attackers to
2684 CVE-2025-31827
0.46%
63.4th 4.9 This path traversal vulnerability in the Fonto WordPress plugin allows attackers to download arbitra
2685 CVE-2024-13693
0.46%
63.3th 5.3 The Enfold WordPress theme has an authorization bypass vulnerability that allows unauthenticated att
2686 CVE-2024-12470
0.45%
63.3th 9.8 The SakolaWP WordPress plugin allows unauthenticated attackers to register as administrative users d
2687 CVE-2025-25373
0.45%
63.3th 9.8 The Memory Management Module in NASA cFS Aquila has insecure permissions that allow attackers to gai
2688 CVE-2025-21434
0.45%
63.3th 7.5 This vulnerability allows a denial-of-service (DoS) condition in Wi-Fi systems when parsing EHT (Ext
2689 CVE-2025-63958
0.45%
63.3th 9.8 MILLENSYS Vision Tools Workspace 6.5.0.2585 exposes an unauthenticated configuration endpoint that l
2690 CVE-2025-48780
0.45%
63.3th 9.8 A critical deserialization vulnerability in Soar Cloud HRD Human Resource Management System allows r
2691 CVE-2024-55605
0.45%
63.3th 7.5 This vulnerability in Suricata allows attackers to cause a denial-of-service by sending specially cr
2692 CVE-2025-25362
0.45%
63.3th 9.8 This Server-Side Template Injection (SSTI) vulnerability in Spacy-LLM v0.7.2 allows attackers to exe
2693 CVE-2025-58159
0.45%
63.3th 9.9 CVE-2025-58159 is a critical remote code execution vulnerability in WeGIA web management software fo
2694 CVE-2025-68155
0.45%
63.3th 7.5 This vulnerability in @vitejs/plugin-rsc allows unauthenticated attackers to read arbitrary files ac
2695 CVE-2021-47727
0.45%
63.3th 5.3 Selea Targa IP OCR-ANPR cameras contain an unauthenticated vulnerability that allows remote attacker
2696 CVE-2021-47851
0.45%
63.3th 9.8 Mini Mouse 9.2.0 contains an unauthenticated remote code execution vulnerability that allows attacke
2697 CVE-2024-13698
0.45%
63.2th 6.5 The Jobify WordPress theme has missing capability checks that allow unauthenticated attackers to mak
2698 CVE-2025-1361
0.45%
63.2th 7.5 The IP2Location Country Blocker WordPress plugin exposes sensitive configuration settings to unauthe
2699 CVE-2025-24269
0.45%
63.2th 9.8 This is a critical memory handling vulnerability in macOS that allows an application to cause a syst
2700 CVE-2025-24263
0.45%
63.2th 9.8 This CVE describes a macOS privacy vulnerability where applications could access unprotected user da

What is EPSS?

The Exploit Prediction Scoring System (EPSS) is a data-driven model developed by FIRST.org that estimates the probability a CVE will be exploited in the wild within the next 30 days. Unlike CVSS which measures severity, EPSS measures likelihood of exploitation — making it ideal for prioritizing which vulnerabilities to patch first.

Why EPSS matters: With thousands of CVEs published monthly, not all vulnerabilities are equally dangerous. EPSS helps security teams focus on the CVEs most likely to be actively exploited, rather than patching solely by CVSS score. A critical CVSS 9.8 vulnerability with 0.1% EPSS may be less urgent than a high CVSS 7.5 with 90% EPSS.

Prioritize by Exploit Risk

Scan your servers and see which vulnerabilities have the highest EPSS scores. Focus on what attackers are actually targeting.

Start Monitoring Free