Most Exploitable CVEs - EPSS Rankings

CVEs ranked by EPSS (Exploit Prediction Scoring System) probability. Higher scores mean a greater likelihood of exploitation in the wild within the next 30 days.

164
EPSS > 50%
156
CISA KEV Listed
35,468
CVEs with EPSS
0.7%
Avg EPSS Score
All Critical High Medium Low
Rank CVE ID EPSS Score Percentile CVSS Flags Summary
2751 CVE-2024-36403
0.44%
62.8th 5.3 Matrix Media Repo (MMR) before version 1.3.5 is vulnerable to a disk fill attack where unauthenticat
2752 CVE-2025-4142
0.44%
62.8th 8.8 A critical buffer overflow vulnerability in Netgear EX6200 wireless extenders allows remote attacker
2753 CVE-2025-4140
0.44%
62.8th 8.8 A critical buffer overflow vulnerability in Netgear EX6120 WiFi extender firmware allows remote atta
2754 CVE-2025-29660
0.44%
62.8th 9.8 This vulnerability allows unauthenticated attackers to execute arbitrary scripts on Yi IOT XY-3820 d
2755 CVE-2025-41699
0.44%
62.8th 8.8 This vulnerability allows a low-privileged remote attacker with web management access to inject and
2756 CVE-2025-54347
0.44%
62.8th 9.9 A directory traversal vulnerability in Desktop Alert PingAlert Application Server versions 6.1.0.11
2757 CVE-2025-66209
0.44%
62.7th 9.9 CVE-2025-66209 is an authenticated command injection vulnerability in Coolify's Database Backup func
2758 CVE-2025-12491
0.44%
62.8th 7.5 This vulnerability allows unauthenticated remote attackers to retrieve sensitive information from Se
2759 CVE-2024-49352
0.44%
62.7th 7.1 IBM Cognos Analytics is vulnerable to XML External Entity Injection (XXE), allowing attackers to rea
2760 CVE-2025-1268
0.44%
62.7th 9.4 This CVE describes an out-of-bounds write vulnerability in multiple Canon printer drivers that could
2761 CVE-2025-66848
0.44%
62.7th 9.8 This vulnerability allows unauthenticated attackers to execute arbitrary commands remotely on affect
2762 CVE-2025-23237
0.44%
62.7th 6.6 This CVE describes an OS command injection vulnerability in UD-LT2 firmware that allows authenticate
2763 CVE-2025-2477
0.44%
62.7th 4.7 The CryoKey WordPress plugin has a reflected cross-site scripting vulnerability in the 'ckemail' par
2764 CVE-2025-27774
0.44%
62.7th 5.3 Applio voice conversion tool versions 3.2.7 and earlier contain server-side request forgery (SSRF) a
2765 CVE-2025-2106
0.44%
62.7th 7.5 This SQL injection vulnerability in the ArielBrailovsky-ViralAd WordPress plugin allows unauthentica
2766 CVE-2024-46209
0.44%
62.6th 5.4 A stored cross-site scripting (XSS) vulnerability in REDAXO CMS v5.17.1 allows attackers to inject m
2767 CVE-2025-64075
0.44%
62.6th 10.0 A path traversal vulnerability in the ZBT WE2001 router's check_token function allows remote attacke
2768 CVE-2025-15472
0.44%
62.6th 7.2 This vulnerability allows remote attackers to execute arbitrary operating system commands on TRENDne
2769 CVE-2025-0447
0.44%
62.6th 8.8 This vulnerability in Google Chrome's navigation implementation allows attackers to escalate privile
2770 CVE-2025-0443
0.44%
62.6th 8.8 This vulnerability in Google Chrome extensions allows attackers to escalate privileges by tricking u
2771 CVE-2025-4607
0.44%
62.6th 9.8 The PSW Front-end Login & Registration WordPress plugin has a critical privilege escalation vulnerab
2772 CVE-2021-4470
0.44%
62.6th N/A CVE-2021-4470 is a critical pre-authentication remote code execution vulnerability in TG8 Firewall's
2773 CVE-2025-23239
0.44%
62.6th 8.7 An authenticated remote command injection vulnerability exists in an undisclosed iControl REST endpo
2774 CVE-2024-13593
0.44%
62.6th 7.5 The BMLT Meeting Map WordPress plugin has a Local File Inclusion vulnerability that allows authentic
2775 CVE-2025-0461
0.44%
62.6th 4.3 This CVE describes a path traversal vulnerability in Shanghai Lingdang Information Technology's Ling
2776 CVE-2019-25222
0.44%
62.6th 4.9 This SQL injection vulnerability in the WordPress Thumbnail Carousel Slider plugin allows unauthenti
2777 CVE-2025-4299
0.44%
62.5th 8.8 A critical buffer overflow vulnerability in Tenda AC1206 routers allows remote attackers to execute
2778 CVE-2025-35027
0.44%
62.6th 7.3 This CVE describes a command injection vulnerability in Unitree robotic products that allows attacke
2779 CVE-2025-8712
0.44%
62.6th 5.4 This CVE describes a missing authorization vulnerability in Ivanti secure access products that allow
2780 CVE-2025-10878
0.44%
62.6th 10.0 An unauthenticated SQL injection vulnerability in Fikir Odalari AdminPando 1.0.1 allows attackers to
2781 CVE-2024-13409
0.44%
62.5th 7.5 This vulnerability allows authenticated WordPress users with Contributor-level access or higher to p
2782 CVE-2025-20146
0.44%
62.5th 8.6 An unauthenticated remote attacker can cause denial of service on affected Cisco routers by sending
2783 CVE-2025-1144
0.44%
62.4th 9.8 The School Affairs System from Quanxun exposes sensitive information to unauthenticated attackers, a
2784 CVE-2025-24320
0.44%
62.4th 8.0 A stored XSS vulnerability in BIG-IP Configuration utility allows attackers to execute JavaScript in
2785 CVE-2025-29484
0.44%
62.4th 7.5 CVE-2025-29484 is an out-of-memory vulnerability in libming's parseABC_NS_SET_INFO function that all
2786 CVE-2025-4120
0.44%
62.4th 8.8 A critical buffer overflow vulnerability in Netgear JWNR2000v2 routers allows remote attackers to ex
2787 CVE-2025-2474
0.44%
62.3th 9.8 CVE-2025-2474 is a critical out-of-bounds write vulnerability in the PCX image codec in QNX SDP that
2788 CVE-2025-29516
0.44%
62.4th 7.2 This CVE describes a command injection vulnerability in D-Link DSL-7740C routers that allows attacke
2789 CVE-2025-15139
0.44%
62.4th 6.3 This CVE describes a command injection vulnerability in TRENDnet TEW-822DRE routers that allows remo
2790 CVE-2025-15133
0.44%
62.4th 6.3 This vulnerability allows remote attackers to execute arbitrary commands on ZSPACE Z4Pro+ devices th
2791 CVE-2025-15132
0.44%
62.4th 6.3 This CVE describes a command injection vulnerability in ZSPACE Z4Pro+ devices that allows remote att
2792 CVE-2025-15131
0.44%
62.4th 6.3 This vulnerability allows remote attackers to execute arbitrary commands on ZSPACE Z4Pro+ devices th
2793 CVE-2024-10628
0.43%
62.3th 7.5 This SQL injection vulnerability in Quiz Maker WordPress plugins allows unauthenticated attackers to
2794 CVE-2025-24019
0.43%
62.3th 7.1 This vulnerability in YesWiki allows any authenticated user to delete arbitrary files owned by the P
2795 CVE-2024-56511
0.43%
62.3th 9.8 This vulnerability allows attackers to bypass authentication in DataEase by exploiting a path traver
2796 CVE-2025-23410
0.43%
62.3th 9.8 CVE-2025-23410 is a path traversal vulnerability in GMOD Apollo's web interface that allows attacker
2797 CVE-2025-4317
0.43%
62.3th 8.8 The TheGem WordPress theme has an arbitrary file upload vulnerability in all versions up to 5.10.3.
2798 CVE-2025-50578
0.43%
62.3th 9.8 CVE-2025-50578 allows unauthenticated attackers to manipulate HTTP headers (X-Forwarded-Host and Ref
2799 CVE-2025-31103
0.43%
62.2th 7.5 CVE-2025-31103 is an untrusted data deserialization vulnerability in a-blog cms that allows attacker
2800 CVE-2025-32118
0.43%
62.2th 9.1 This vulnerability allows attackers to upload malicious files to WordPress sites using the CMP – C

What is EPSS?

The Exploit Prediction Scoring System (EPSS) is a data-driven model developed by FIRST.org that estimates the probability a CVE will be exploited in the wild within the next 30 days. Unlike CVSS which measures severity, EPSS measures likelihood of exploitation — making it ideal for prioritizing which vulnerabilities to patch first.

Why EPSS matters: With thousands of CVEs published monthly, not all vulnerabilities are equally dangerous. EPSS helps security teams focus on the CVEs most likely to be actively exploited, rather than patching solely by CVSS score. A critical CVSS 9.8 vulnerability with 0.1% EPSS may be less urgent than a high CVSS 7.5 with 90% EPSS.

Prioritize by Exploit Risk

Scan your servers and see which vulnerabilities have the highest EPSS scores. Focus on what attackers are actually targeting.

Start Monitoring Free