Most Exploitable CVEs - EPSS Rankings
CVEs ranked by EPSS (Exploit Prediction Scoring System) probability. Higher scores mean a greater likelihood of exploitation in the wild within the next 30 days.
| Rank | CVE ID | EPSS Score | Percentile | CVSS | Flags | Summary |
|---|---|---|---|---|---|---|
| 2851 | CVE-2025-7673 |
|
61.7th | 9.8 | A buffer overflow vulnerability in the zhttpd URL parser of Zyxel VMG8825-T50K routers allows unauth | |
| 2852 | CVE-2024-12803 |
|
61.6th | 7.2 | A post-authentication stack-based buffer overflow vulnerability in SonicOS management interface allo | |
| 2853 | CVE-2024-57707 |
|
61.7th | 9.8 | This vulnerability allows remote attackers to execute arbitrary code on DataEase v1 systems by explo | |
| 2854 | CVE-2024-12039 |
|
61.6th | 8.1 | This vulnerability allows unauthenticated attackers to reset passwords for any user, including admin | |
| 2855 | CVE-2025-2025 |
|
61.7th | 6.5 | The GiveWP WordPress plugin has an authorization vulnerability that allows unauthenticated attackers | |
| 2856 | CVE-2025-11418 |
|
61.7th | 9.8 | This is a critical stack-based buffer overflow vulnerability in Tenda CH22 routers that allows remot | |
| 2857 | CVE-2023-53739 |
|
61.6th | N/A | CVE-2023-53739 allows unauthenticated remote attackers to download configuration backup files from T | |
| 2858 | CVE-2025-59156 |
|
61.7th | 8.8 | This vulnerability allows low-privileged users in Coolify to inject malicious Docker Compose directi | |
| 2859 | CVE-2024-12269 |
|
61.6th | 7.5 | This vulnerability allows unauthenticated attackers to download the entire WordPress database throug | |
| 2860 | CVE-2025-31016 |
|
61.6th | 7.5 | This CVE describes a PHP Local File Inclusion vulnerability in the JetWooBuilder WordPress plugin. A | |
| 2861 | CVE-2025-31432 |
|
61.6th | 7.5 | This CVE describes a PHP Local File Inclusion vulnerability in the Pop-Up Chop Chop WordPress plugin | |
| 2862 | CVE-2025-26890 |
|
61.6th | 7.5 | This CVE describes a PHP Local File Inclusion vulnerability in the HUSKY plugin for WordPress. Attac | |
| 2863 | CVE-2025-30890 |
|
61.6th | 7.5 | This vulnerability allows attackers to include local files on the server through improper filename c | |
| 2864 | CVE-2025-30871 |
|
61.6th | 7.5 | This vulnerability allows attackers to include local files on the server through improper input vali | |
| 2865 | CVE-2025-30831 |
|
61.6th | 7.5 | This vulnerability allows attackers to include local files on the server through improper filename c | |
| 2866 | CVE-2025-30829 |
|
61.6th | 7.5 | This vulnerability allows attackers to include local files on the server through improper input vali | |
| 2867 | CVE-2025-30820 |
|
61.6th | 7.5 | This vulnerability allows attackers to include local files on the server through improper input vali | |
| 2868 | CVE-2025-30814 |
|
61.6th | 7.5 | This vulnerability allows attackers to include local files on the server through improper filename c | |
| 2869 | CVE-2025-30785 |
|
61.6th | 7.5 | This vulnerability allows attackers to include local files on the server through PHP's include/requi | |
| 2870 | CVE-2025-1938 |
|
61.6th | 6.5 | This CVE describes memory safety bugs in Firefox and Thunderbird that could lead to memory corruptio | |
| 2871 | CVE-2025-39452 |
|
61.6th | 7.5 | This vulnerability allows attackers to include local files on the server through improper filename c | |
| 2872 | CVE-2025-39592 |
|
61.6th | 7.5 | This vulnerability allows attackers to include arbitrary local files on the server through PHP's inc | |
| 2873 | CVE-2025-39584 |
|
61.6th | 7.5 | This vulnerability allows attackers to include local files on the server through improper input vali | |
| 2874 | CVE-2025-31014 |
|
61.6th | 7.5 | This vulnerability allows attackers to include local files on the server through PHP's include/requi | |
| 2875 | CVE-2025-22279 |
|
61.6th | 7.5 | This vulnerability allows attackers to include local files on the server through improper filename c | |
| 2876 | CVE-2025-32692 |
|
61.6th | 7.5 | This vulnerability allows attackers to include local PHP files through improper filename control in | |
| 2877 | CVE-2025-32159 |
|
61.6th | 7.5 | This vulnerability allows attackers to include local files on the server through improper filename c | |
| 2878 | CVE-2025-32156 |
|
61.6th | 7.5 | This vulnerability allows attackers to include local files on the server through improper input vali | |
| 2879 | CVE-2025-32154 |
|
61.6th | 7.5 | This vulnerability allows attackers to include local files on the server through improper filename c | |
| 2880 | CVE-2025-32152 |
|
61.6th | 7.5 | This vulnerability allows attackers to include local files on the server through improper filename c | |
| 2881 | CVE-2025-32150 |
|
61.6th | 7.5 | This vulnerability allows attackers to include local files on the server through improper filename c | |
| 2882 | CVE-2025-30782 |
|
61.6th | 7.5 | This vulnerability allows attackers to include local files on the server through improper filename c | |
| 2883 | CVE-2025-25270 |
|
61.6th | 9.8 | This critical vulnerability allows unauthenticated remote attackers to modify device configurations, | |
| 2884 | CVE-2024-56322 |
|
61.5th | 7.2 | GoCD versions 16.7.0 through 24.4.0 contain an XML External Entity (XXE) injection vulnerability in | |
| 2885 | CVE-2025-27299 |
|
61.5th | 5.3 | This path traversal vulnerability in the MyTicket Events WordPress plugin allows attackers to read f | |
| 2886 | CVE-2025-14440 |
|
61.6th | 9.8 | The JAY Login & Register WordPress plugin has an authentication bypass vulnerability that allows una | |
| 2887 | CVE-2025-13613 |
|
61.6th | 9.8 | The Elated Membership WordPress plugin has an authentication bypass vulnerability that allows unauth | |
| 2888 | CVE-2025-22389 |
|
61.5th | 8.0 | This vulnerability in Optimizely EPiServer CMS Core allows attackers to upload malicious files like | |
| 2889 | CVE-2025-23388 |
|
61.4th | 8.2 | A stack-based buffer overflow vulnerability in SUSE Rancher allows attackers to cause denial of serv | |
| 2890 | CVE-2025-5935 |
|
61.5th | 5.3 | A denial-of-service vulnerability in Open5GS AMF/MME component allows remote attackers to crash the | |
| 2891 | CVE-2025-54926 |
|
61.4th | 7.2 | This path traversal vulnerability allows authenticated administrators to upload malicious files that | |
| 2892 | CVE-2023-7330 |
|
61.5th | N/A | Ruijie NBR series routers have an unauthenticated arbitrary file upload vulnerability in the /ddi/se | |
| 2893 | CVE-2024-53969 |
|
61.4th | 5.4 | This DOM-based Cross-Site Scripting (XSS) vulnerability in Adobe Experience Manager allows attackers | |
| 2894 | CVE-2024-53967 |
|
61.4th | 5.4 | Adobe Experience Manager versions 6.5.21 and earlier contain a DOM-based cross-site scripting vulner | |
| 2895 | CVE-2025-27025 |
|
61.4th | 8.8 | This vulnerability allows unauthenticated attackers to read and write arbitrary files on affected de | |
| 2896 | CVE-2025-44179 |
|
61.4th | 6.5 | This CVE describes a command injection vulnerability in Hitron CGNF-TWN routers that allows attacker | |
| 2897 | CVE-2023-53868 |
|
61.4th | 8.8 | CVE-2023-53868 is a remote code execution vulnerability in Coppermine Gallery that allows authentica | |
| 2898 | CVE-2024-45478 |
|
61.3th | 4.8 | A stored cross-site scripting (XSS) vulnerability exists in the Edit Service Page of Apache Ranger's | |
| 2899 | CVE-2025-21401 |
|
61.3th | 4.5 | This vulnerability allows attackers to bypass security features in Microsoft Edge, potentially enabl | |
| 2900 | CVE-2025-24221 |
|
61.4th | 7.5 | This vulnerability allows unauthorized access to sensitive keychain data from iOS backups. Attackers |
What is EPSS?
The Exploit Prediction Scoring System (EPSS) is a data-driven model developed by FIRST.org that estimates the probability a CVE will be exploited in the wild within the next 30 days. Unlike CVSS which measures severity, EPSS measures likelihood of exploitation — making it ideal for prioritizing which vulnerabilities to patch first.
Why EPSS matters: With thousands of CVEs published monthly, not all vulnerabilities are equally dangerous. EPSS helps security teams focus on the CVEs most likely to be actively exploited, rather than patching solely by CVSS score. A critical CVSS 9.8 vulnerability with 0.1% EPSS may be less urgent than a high CVSS 7.5 with 90% EPSS.
Prioritize by Exploit Risk
Scan your servers and see which vulnerabilities have the highest EPSS scores. Focus on what attackers are actually targeting.
Start Monitoring Free