Most Exploitable CVEs - EPSS Rankings
CVEs ranked by EPSS (Exploit Prediction Scoring System) probability. Higher scores mean a greater likelihood of exploitation in the wild within the next 30 days.
| Rank | CVE ID | EPSS Score | Percentile | CVSS | Flags | Summary |
|---|---|---|---|---|---|---|
| 2701 | CVE-2025-54448 |
|
20th | 9.8 | This vulnerability allows attackers to upload malicious files to Samsung MagicINFO 9 Server, leading | |
| 2702 | CVE-2025-54442 |
|
20th | 9.8 | This vulnerability allows attackers to upload malicious files to Samsung MagicINFO 9 Server, which c | |
| 2703 | CVE-2025-54440 |
|
20th | 9.8 | This vulnerability allows attackers to upload malicious files to Samsung MagicINFO 9 Server, which c | |
| 2704 | CVE-2025-53639 |
|
19.9th | 9.8 | This SQL injection vulnerability in MeterSphere allows attackers to execute arbitrary SQL commands t | |
| 2705 | CVE-2025-43931 |
|
19.7th | 9.8 | This vulnerability allows attackers to take over user accounts in Flask Boilerplate applications by | |
| 2706 | CVE-2025-49867 |
|
19.7th | 9.8 | CVE-2025-49867 is an incorrect privilege assignment vulnerability in the RealHomes WordPress theme t | |
| 2707 | CVE-2025-23970 |
|
19.7th | 9.8 | This vulnerability allows attackers to escalate privileges in the Service Finder Booking WordPress p | |
| 2708 | CVE-2025-54677 |
|
19.8th | 9.1 | This vulnerability allows attackers to upload malicious files to WordPress sites using the vcita Onl | |
| 2709 | CVE-2025-6237 |
|
19.7th | 9.8 | This vulnerability in InvokeAI allows attackers to perform path traversal attacks through the image | |
| 2710 | CVE-2025-59345 |
|
19.7th | 9.1 | Dragonfly Manager web UI endpoints /api/v1/jobs and /preheats lack authentication in versions before | |
| 2711 | CVE-2025-42944 |
|
19.9th | 10.0 | This CVE describes a critical deserialization vulnerability in SAP NetWeaver's RMI-P4 module that al | |
| 2712 | CVE-2025-57148 |
|
19.7th | 9.1 | phpgurukul Online Shopping Portal 2.0 contains an arbitrary file upload vulnerability in the admin p | |
| 2713 | CVE-2024-45162 |
|
19.8th | 9.8 | A stack-based buffer overflow vulnerability in the phddns client of Blu-Castle BCUM221E devices allo | |
| 2714 | CVE-2025-61043 |
|
19.8th | 9.1 | An out-of-bounds read vulnerability in Monkey's Audio 11.31 allows attackers to read beyond allocate | |
| 2715 | CVE-2025-49060 |
|
19.8th | 10.0 | This vulnerability allows attackers to upload arbitrary files, including web shells, to servers runn | |
| 2716 | CVE-2025-48106 |
|
19.8th | 10.0 | This vulnerability allows attackers to upload malicious files to websites using the Clanora WordPres | |
| 2717 | CVE-2023-28814 |
|
19.8th | 9.8 | Hikvision iSecure Center software has an improper file upload vulnerability that allows attackers to | |
| 2718 | CVE-2025-60307 |
|
19.7th | 9.8 | CVE-2025-60307 is a critical SQL injection vulnerability in code-projects Computer Laboratory System | |
| 2719 | CVE-2025-51746 |
|
19.9th | 9.8 | CVE-2025-51746 is a critical deserialization vulnerability in jishenghua JSH_ERP 2.3.1 that allows r | |
| 2720 | CVE-2025-51745 |
|
19.9th | 9.8 | CVE-2025-51745 is a critical deserialization vulnerability in jishenghua JSH_ERP 2.3.1 that allows r | |
| 2721 | CVE-2025-51743 |
|
19.9th | 9.8 | This vulnerability allows remote attackers to execute arbitrary code on JSH_ERP systems through fast | |
| 2722 | CVE-2025-51742 |
|
19.9th | 9.8 | This vulnerability allows remote attackers to execute arbitrary code on JSH_ERP systems by exploitin | |
| 2723 | CVE-2025-40548 |
|
19.7th | 9.1 | A missing validation vulnerability in SolarWinds Serv-U allows administrators to execute arbitrary c | |
| 2724 | CVE-2025-54339 |
|
19.7th | 10.0 | An incorrect access control vulnerability in Desktop Alert PingAlert application server versions 6.1 | |
| 2725 | CVE-2025-13026 |
|
19.7th | 9.8 | This CVE describes a sandbox escape vulnerability in Firefox and Thunderbird's WebGPU component due | |
| 2726 | CVE-2025-13024 |
|
19.7th | 9.8 | A critical JIT miscompilation vulnerability in Firefox and Thunderbird's JavaScript engine allows ar | |
| 2727 | CVE-2025-13023 |
|
19.7th | 9.8 | A sandbox escape vulnerability in Firefox and Thunderbird's WebGPU component allows attackers to exe | |
| 2728 | CVE-2025-13022 |
|
19.7th | 9.8 | A critical vulnerability in Firefox and Thunderbird's WebGPU component allows memory corruption due | |
| 2729 | CVE-2025-13021 |
|
19.7th | 9.8 | A critical vulnerability in Firefox and Thunderbird's WebGPU component allows memory corruption due | |
| 2730 | CVE-2025-60235 |
|
19.8th | 10.0 | This vulnerability allows attackers to upload malicious files to WooCommerce sites using the Helpdes | |
| 2731 | CVE-2025-60207 |
|
19.8th | 10.0 | This vulnerability allows attackers to upload arbitrary files, including web shells, to WooCommerce | |
| 2732 | CVE-2025-53283 |
|
19.8th | 10.0 | This vulnerability allows attackers to upload arbitrary files, including web shells, to WordPress se | |
| 2733 | CVE-2025-68615 |
|
19.9th | 9.8 | A buffer overflow vulnerability in net-snmp's snmptrapd daemon allows remote attackers to crash the | |
| 2734 | CVE-2025-67793 |
|
19.9th | 9.8 | A privilege escalation vulnerability in DriveLock allows users with 'Manage roles and permissions' p | |
| 2735 | CVE-2025-14321 |
|
19.7th | 9.8 | A use-after-free vulnerability in the WebRTC signaling component allows attackers to execute arbitra | |
| 2736 | CVE-2025-54303 |
|
19.8th | 9.8 | Thermo Fisher Torrent Suite 5.18.1 uses weak default credentials (ionadmin/ionadmin) for administrat | |
| 2737 | CVE-2025-11778 |
|
19.8th | 9.8 | A stack-based buffer overflow vulnerability in Circutor SGE-PLC1000/SGE-PLC50 v0.9.2 allows remote a | |
| 2738 | CVE-2025-14942 |
|
19.9th | 9.8 | A critical authentication bypass vulnerability in wolfSSH's key exchange state machine allows attack | |
| 2739 | CVE-2025-44619 |
|
19.6th | 9.1 | The Tinxy WiFi Lock Controller v1 RF transmits on an open Wi-Fi network without authentication, allo | |
| 2740 | CVE-2024-12225 |
|
19.6th | 9.1 | This vulnerability in Quarkus's WebAuthn module allows attackers to bypass authentication by accessi | |
| 2741 | CVE-2025-49216 |
|
19.6th | 9.8 | This critical authentication bypass vulnerability in Trend Micro Endpoint Encryption PolicyServer al | |
| 2742 | CVE-2025-40908 |
|
19.5th | 9.1 | This vulnerability in YAML-LibYAML for Perl allows attackers to modify existing files on the system | |
| 2743 | CVE-2025-48300 |
|
19.5th | 9.1 | This vulnerability allows attackers to upload arbitrary files, including web shells, to WordPress se | |
| 2744 | CVE-2025-8042 |
|
19.4th | 9.8 | Firefox for Android versions before 141 allow sandboxed iframes without the 'allow-downloads' attrib | |
| 2745 | CVE-2025-54874 |
|
19.6th | 9.8 | This vulnerability in OpenJPEG allows an attacker to write data beyond allocated heap memory boundar | |
| 2746 | CVE-2025-52549 |
|
19.4th | 9.8 | CVE-2025-52549 allows attackers to predict the root Linux password on vulnerable E3 Site Supervisor | |
| 2747 | CVE-2025-41347 |
|
19.6th | 9.8 | This vulnerability allows unauthenticated attackers to upload dangerous files (like webshells) to Wi | |
| 2748 | CVE-2025-62047 |
|
19.6th | 9.9 | This vulnerability allows attackers to upload arbitrary files to WordPress sites using the Case Addo | |
| 2749 | CVE-2025-62016 |
|
19.6th | 9.9 | This vulnerability allows attackers to upload arbitrary files to WordPress sites using the Kallyas t | |
| 2750 | CVE-2026-23906 |
|
19.7th | 9.8 | This authentication bypass vulnerability in Apache Druid allows attackers to gain unauthorized acces |
What is EPSS?
The Exploit Prediction Scoring System (EPSS) is a data-driven model developed by FIRST.org that estimates the probability a CVE will be exploited in the wild within the next 30 days. Unlike CVSS which measures severity, EPSS measures likelihood of exploitation — making it ideal for prioritizing which vulnerabilities to patch first.
Why EPSS matters: With thousands of CVEs published monthly, not all vulnerabilities are equally dangerous. EPSS helps security teams focus on the CVEs most likely to be actively exploited, rather than patching solely by CVSS score. A critical CVSS 9.8 vulnerability with 0.1% EPSS may be less urgent than a high CVSS 7.5 with 90% EPSS.
Prioritize by Exploit Risk
Scan your servers and see which vulnerabilities have the highest EPSS scores. Focus on what attackers are actually targeting.
Start Monitoring Free