Most Exploitable CVEs - EPSS Rankings
CVEs ranked by EPSS (Exploit Prediction Scoring System) probability. Higher scores mean a greater likelihood of exploitation in the wild within the next 30 days.
| Rank | CVE ID | EPSS Score | Percentile | CVSS | Flags | Summary |
|---|---|---|---|---|---|---|
| 2701 | CVE-2025-31129 |
|
63.2th | 8.8 | This vulnerability in Jooby's pac4j SessionStoreImpl module allows remote code execution through ins | |
| 2702 | CVE-2025-52377 |
|
63.2th | 5.4 | This command injection vulnerability in Nexxt Solutions NCM-X1800 Mesh Router allows authenticated a | |
| 2703 | CVE-2025-53825 |
|
63.2th | 9.4 | CVE-2025-53825 is an unauthenticated remote code execution vulnerability in Dokploy's preview deploy | |
| 2704 | CVE-2026-0796 |
|
63.2th | 8.8 | This vulnerability allows authenticated remote attackers to execute arbitrary system commands on ALG | |
| 2705 | CVE-2024-13364 |
|
63.2th | 5.3 | The Raptive Ads WordPress plugin has an authorization bypass vulnerability that allows unauthenticat | |
| 2706 | CVE-2025-25211 |
|
63.2th | 9.8 | CVE-2025-25211 is a weak password requirements vulnerability in CHOCO TEI WATCHER mini (IB-MCT001) i | |
| 2707 | CVE-2025-2363 |
|
63.2th | 6.3 | This critical vulnerability in lenve VBlog allows remote attackers to perform path traversal attacks | |
| 2708 | CVE-2025-5630 |
|
63.2th | 9.8 | This critical vulnerability in D-Link DIR-816 routers allows remote attackers to execute arbitrary c | |
| 2709 | CVE-2025-5624 |
|
63.2th | 9.8 | This critical vulnerability in D-Link DIR-816 routers allows remote attackers to execute arbitrary c | |
| 2710 | CVE-2025-10432 |
|
63.2th | 9.8 | This vulnerability allows remote attackers to execute arbitrary code on Tenda AC1206 routers via a s | |
| 2711 | CVE-2024-55590 |
|
63.1th | 8.8 | This vulnerability allows authenticated attackers with read-only admin permissions and CLI access to | |
| 2712 | CVE-2025-4903 |
|
63.1th | 5.3 | This critical vulnerability in D-Link DI-7003GV2 routers allows remote attackers to change passwords | |
| 2713 | CVE-2025-3054 |
|
63.2th | 8.8 | The WP User Frontend Pro plugin for WordPress has a vulnerability that allows authenticated attacker | |
| 2714 | CVE-2025-12824 |
|
63.1th | 8.8 | The Player Leaderboard WordPress plugin contains a Local File Inclusion vulnerability that allows au | |
| 2715 | CVE-2025-1717 |
|
63.1th | 8.1 | The Login Me Now WordPress plugin versions up to 1.7.2 contain an authentication bypass vulnerabilit | |
| 2716 | CVE-2025-9588 |
|
63.1th | 10.0 | This critical OS command injection vulnerability in Iron Mountain Archiving Services EnVision allows | |
| 2717 | CVE-2025-59741 |
|
63.1th | 9.8 | This is a critical command injection vulnerability in AndSoft's e-TMS v25.03 that allows unauthentic | |
| 2718 | CVE-2025-59740 |
|
63.1th | 9.8 | This is a critical command injection vulnerability in AndSoft's e-TMS transportation management soft | |
| 2719 | CVE-2025-59739 |
|
63.1th | 9.8 | This is a critical command injection vulnerability in AndSoft's e-TMS transportation management soft | |
| 2720 | CVE-2025-59738 |
|
63.1th | 9.8 | This is a critical command injection vulnerability in AndSoft's e-TMS v25.03 that allows unauthentic | |
| 2721 | CVE-2025-59737 |
|
63.1th | 9.8 | This is a critical command injection vulnerability in AndSoft's e-TMS transportation management syst | |
| 2722 | CVE-2025-59736 |
|
63.1th | 9.8 | This is a critical command injection vulnerability in AndSoft's e-TMS v25.03 that allows attackers t | |
| 2723 | CVE-2025-59735 |
|
63.1th | 9.8 | This is a critical command injection vulnerability in AndSoft's e-TMS transportation management syst | |
| 2724 | CVE-2025-25456 |
|
63.1th | 9.8 | This vulnerability allows remote attackers to execute arbitrary code on Tenda AC10 routers via a buf | |
| 2725 | CVE-2025-4561 |
|
63.1th | 8.8 | CVE-2025-4561 is an arbitrary file upload vulnerability in KFOX from KingFor that allows authenticat | |
| 2726 | CVE-2025-6337 |
|
63.1th | 8.8 | A critical buffer overflow vulnerability in TOTOLINK A3002R and A3002RU routers allows remote attack | |
| 2727 | CVE-2025-5503 |
|
63th | 8.8 | This critical vulnerability in TOTOLINK X15 routers allows remote attackers to execute arbitrary cod | |
| 2728 | CVE-2026-22241 |
|
63.1th | 7.2 | CVE-2026-22241 is an arbitrary file upload vulnerability in Open eClass (formerly GUnet eClass) that | |
| 2729 | CVE-2025-26617 |
|
63th | 9.8 | A SQL injection vulnerability in WeGIA's historico_paciente.php endpoint allows attackers to execute | |
| 2730 | CVE-2025-26608 |
|
63th | 9.8 | A SQL injection vulnerability in WeGIA's dependente_docdependente.php endpoint allows attackers to e | |
| 2731 | CVE-2025-26606 |
|
63th | 9.8 | A SQL injection vulnerability in WeGIA's informacao_adicional.php endpoint allows attackers to execu | |
| 2732 | CVE-2025-27867 |
|
63th | 5.6 | This is a cross-site scripting (XSS) vulnerability in Apache Felix HTTP Webconsole Plugin that allow | |
| 2733 | CVE-2025-29420 |
|
63th | 7.5 | PerfreeBlog v4.0.11 contains a directory traversal vulnerability in the getThemeFilesByName function | |
| 2734 | CVE-2025-5397 |
|
63th | 9.8 | This vulnerability allows unauthenticated attackers to bypass authentication and gain administrative | |
| 2735 | CVE-2025-10640 |
|
63th | 9.8 | CVE-2025-10640 allows unauthenticated attackers to bypass authentication on WorkExaminer Professiona | |
| 2736 | CVE-2025-13539 |
|
63th | 9.8 | The FindAll Membership WordPress plugin has an authentication bypass vulnerability that allows unaut | |
| 2737 | CVE-2025-24172 |
|
63th | 9.8 | A sandbox escape vulnerability in Apple Mail allows malicious email content to bypass the 'Block All | |
| 2738 | CVE-2025-6445 |
|
63th | 8.1 | ServiceStack's FindType method contains a directory traversal vulnerability that allows remote attac | |
| 2739 | CVE-2025-4689 |
|
62.9th | 9.8 | This vulnerability allows unauthenticated attackers to execute arbitrary code on WordPress servers r | |
| 2740 | CVE-2025-7451 |
|
62.9th | 9.8 | CVE-2025-7451 is an unauthenticated remote OS command injection vulnerability in iSherlock software | |
| 2741 | CVE-2025-66259 |
|
62.9th | 9.8 | This vulnerability allows authenticated attackers to execute arbitrary commands with root privileges | |
| 2742 | CVE-2026-21448 |
|
62.9th | 9.8 | Bagisto eCommerce platform versions before 2.3.10 are vulnerable to server-side template injection t | |
| 2743 | CVE-2025-0840 |
|
62.8th | 5.0 | A stack-based buffer overflow vulnerability exists in GNU Binutils' objdump tool when processing spe | |
| 2744 | CVE-2024-12649 |
|
62.8th | 9.8 | A buffer overflow vulnerability in XPS data font processing allows attackers on the same network seg | |
| 2745 | CVE-2024-12647 |
|
62.8th | 9.8 | A buffer overflow vulnerability in CPCA font download processing for Canon multifunction printers al | |
| 2746 | CVE-2024-13408 |
|
62.8th | 7.5 | This vulnerability allows authenticated WordPress users with Contributor-level access or higher to i | |
| 2747 | CVE-2024-35106 |
|
62.8th | 4.6 | A buffer overflow vulnerability exists in the NEXTU FLETA AX1500 WIFI6 router's web interface at /bo | |
| 2748 | CVE-2025-2367 |
|
62.8th | 6.3 | This CVE describes a critical OS command injection vulnerability in Oiwtech OIW-2431APGN-HP wireless | |
| 2749 | CVE-2025-30065 |
|
62.9th | 9.8 | This vulnerability in Apache Parquet's parquet-avro module allows attackers to execute arbitrary cod | |
| 2750 | CVE-2025-9363 |
|
62.8th | 8.8 | A stack-based buffer overflow vulnerability in Linksys RE series range extenders allows remote attac |
What is EPSS?
The Exploit Prediction Scoring System (EPSS) is a data-driven model developed by FIRST.org that estimates the probability a CVE will be exploited in the wild within the next 30 days. Unlike CVSS which measures severity, EPSS measures likelihood of exploitation — making it ideal for prioritizing which vulnerabilities to patch first.
Why EPSS matters: With thousands of CVEs published monthly, not all vulnerabilities are equally dangerous. EPSS helps security teams focus on the CVEs most likely to be actively exploited, rather than patching solely by CVSS score. A critical CVSS 9.8 vulnerability with 0.1% EPSS may be less urgent than a high CVSS 7.5 with 90% EPSS.
Prioritize by Exploit Risk
Scan your servers and see which vulnerabilities have the highest EPSS scores. Focus on what attackers are actually targeting.
Start Monitoring Free