Most Exploitable CVEs - EPSS Rankings

CVEs ranked by EPSS (Exploit Prediction Scoring System) probability. Higher scores mean a greater likelihood of exploitation in the wild within the next 30 days.

164
EPSS > 50%
156
CISA KEV Listed
35,468
CVEs with EPSS
0.7%
Avg EPSS Score
All Critical High Medium Low
Rank CVE ID EPSS Score Percentile CVSS Flags Summary
2851 CVE-2025-7673
0.43%
61.7th 9.8 A buffer overflow vulnerability in the zhttpd URL parser of Zyxel VMG8825-T50K routers allows unauth
2852 CVE-2024-12803
0.42%
61.6th 7.2 A post-authentication stack-based buffer overflow vulnerability in SonicOS management interface allo
2853 CVE-2024-57707
0.42%
61.7th 9.8 This vulnerability allows remote attackers to execute arbitrary code on DataEase v1 systems by explo
2854 CVE-2024-12039
0.42%
61.6th 8.1 This vulnerability allows unauthenticated attackers to reset passwords for any user, including admin
2855 CVE-2025-2025
0.42%
61.7th 6.5 The GiveWP WordPress plugin has an authorization vulnerability that allows unauthenticated attackers
2856 CVE-2025-11418
0.42%
61.7th 9.8 This is a critical stack-based buffer overflow vulnerability in Tenda CH22 routers that allows remot
2857 CVE-2023-53739
0.42%
61.6th N/A CVE-2023-53739 allows unauthenticated remote attackers to download configuration backup files from T
2858 CVE-2025-59156
0.42%
61.7th 8.8 This vulnerability allows low-privileged users in Coolify to inject malicious Docker Compose directi
2859 CVE-2024-12269
0.42%
61.6th 7.5 This vulnerability allows unauthenticated attackers to download the entire WordPress database throug
2860 CVE-2025-31016
0.42%
61.6th 7.5 This CVE describes a PHP Local File Inclusion vulnerability in the JetWooBuilder WordPress plugin. A
2861 CVE-2025-31432
0.42%
61.6th 7.5 This CVE describes a PHP Local File Inclusion vulnerability in the Pop-Up Chop Chop WordPress plugin
2862 CVE-2025-26890
0.42%
61.6th 7.5 This CVE describes a PHP Local File Inclusion vulnerability in the HUSKY plugin for WordPress. Attac
2863 CVE-2025-30890
0.42%
61.6th 7.5 This vulnerability allows attackers to include local files on the server through improper filename c
2864 CVE-2025-30871
0.42%
61.6th 7.5 This vulnerability allows attackers to include local files on the server through improper input vali
2865 CVE-2025-30831
0.42%
61.6th 7.5 This vulnerability allows attackers to include local files on the server through improper filename c
2866 CVE-2025-30829
0.42%
61.6th 7.5 This vulnerability allows attackers to include local files on the server through improper input vali
2867 CVE-2025-30820
0.42%
61.6th 7.5 This vulnerability allows attackers to include local files on the server through improper input vali
2868 CVE-2025-30814
0.42%
61.6th 7.5 This vulnerability allows attackers to include local files on the server through improper filename c
2869 CVE-2025-30785
0.42%
61.6th 7.5 This vulnerability allows attackers to include local files on the server through PHP's include/requi
2870 CVE-2025-1938
0.42%
61.6th 6.5 This CVE describes memory safety bugs in Firefox and Thunderbird that could lead to memory corruptio
2871 CVE-2025-39452
0.42%
61.6th 7.5 This vulnerability allows attackers to include local files on the server through improper filename c
2872 CVE-2025-39592
0.42%
61.6th 7.5 This vulnerability allows attackers to include arbitrary local files on the server through PHP's inc
2873 CVE-2025-39584
0.42%
61.6th 7.5 This vulnerability allows attackers to include local files on the server through improper input vali
2874 CVE-2025-31014
0.42%
61.6th 7.5 This vulnerability allows attackers to include local files on the server through PHP's include/requi
2875 CVE-2025-22279
0.42%
61.6th 7.5 This vulnerability allows attackers to include local files on the server through improper filename c
2876 CVE-2025-32692
0.42%
61.6th 7.5 This vulnerability allows attackers to include local PHP files through improper filename control in
2877 CVE-2025-32159
0.42%
61.6th 7.5 This vulnerability allows attackers to include local files on the server through improper filename c
2878 CVE-2025-32156
0.42%
61.6th 7.5 This vulnerability allows attackers to include local files on the server through improper input vali
2879 CVE-2025-32154
0.42%
61.6th 7.5 This vulnerability allows attackers to include local files on the server through improper filename c
2880 CVE-2025-32152
0.42%
61.6th 7.5 This vulnerability allows attackers to include local files on the server through improper filename c
2881 CVE-2025-32150
0.42%
61.6th 7.5 This vulnerability allows attackers to include local files on the server through improper filename c
2882 CVE-2025-30782
0.42%
61.6th 7.5 This vulnerability allows attackers to include local files on the server through improper filename c
2883 CVE-2025-25270
0.42%
61.6th 9.8 This critical vulnerability allows unauthenticated remote attackers to modify device configurations,
2884 CVE-2024-56322
0.42%
61.5th 7.2 GoCD versions 16.7.0 through 24.4.0 contain an XML External Entity (XXE) injection vulnerability in
2885 CVE-2025-27299
0.42%
61.5th 5.3 This path traversal vulnerability in the MyTicket Events WordPress plugin allows attackers to read f
2886 CVE-2025-14440
0.42%
61.6th 9.8 The JAY Login & Register WordPress plugin has an authentication bypass vulnerability that allows una
2887 CVE-2025-13613
0.42%
61.6th 9.8 The Elated Membership WordPress plugin has an authentication bypass vulnerability that allows unauth
2888 CVE-2025-22389
0.42%
61.5th 8.0 This vulnerability in Optimizely EPiServer CMS Core allows attackers to upload malicious files like
2889 CVE-2025-23388
0.42%
61.4th 8.2 A stack-based buffer overflow vulnerability in SUSE Rancher allows attackers to cause denial of serv
2890 CVE-2025-5935
0.42%
61.5th 5.3 A denial-of-service vulnerability in Open5GS AMF/MME component allows remote attackers to crash the
2891 CVE-2025-54926
0.42%
61.4th 7.2 This path traversal vulnerability allows authenticated administrators to upload malicious files that
2892 CVE-2023-7330
0.42%
61.5th N/A Ruijie NBR series routers have an unauthenticated arbitrary file upload vulnerability in the /ddi/se
2893 CVE-2024-53969
0.42%
61.4th 5.4 This DOM-based Cross-Site Scripting (XSS) vulnerability in Adobe Experience Manager allows attackers
2894 CVE-2024-53967
0.42%
61.4th 5.4 Adobe Experience Manager versions 6.5.21 and earlier contain a DOM-based cross-site scripting vulner
2895 CVE-2025-27025
0.42%
61.4th 8.8 This vulnerability allows unauthenticated attackers to read and write arbitrary files on affected de
2896 CVE-2025-44179
0.42%
61.4th 6.5 This CVE describes a command injection vulnerability in Hitron CGNF-TWN routers that allows attacker
2897 CVE-2023-53868
0.42%
61.4th 8.8 CVE-2023-53868 is a remote code execution vulnerability in Coppermine Gallery that allows authentica
2898 CVE-2024-45478
0.42%
61.3th 4.8 A stored cross-site scripting (XSS) vulnerability exists in the Edit Service Page of Apache Ranger's
2899 CVE-2025-21401
0.42%
61.3th 4.5 This vulnerability allows attackers to bypass security features in Microsoft Edge, potentially enabl
2900 CVE-2025-24221
0.42%
61.4th 7.5 This vulnerability allows unauthorized access to sensitive keychain data from iOS backups. Attackers

What is EPSS?

The Exploit Prediction Scoring System (EPSS) is a data-driven model developed by FIRST.org that estimates the probability a CVE will be exploited in the wild within the next 30 days. Unlike CVSS which measures severity, EPSS measures likelihood of exploitation — making it ideal for prioritizing which vulnerabilities to patch first.

Why EPSS matters: With thousands of CVEs published monthly, not all vulnerabilities are equally dangerous. EPSS helps security teams focus on the CVEs most likely to be actively exploited, rather than patching solely by CVSS score. A critical CVSS 9.8 vulnerability with 0.1% EPSS may be less urgent than a high CVSS 7.5 with 90% EPSS.

Prioritize by Exploit Risk

Scan your servers and see which vulnerabilities have the highest EPSS scores. Focus on what attackers are actually targeting.

Start Monitoring Free