Most Exploitable CVEs - EPSS Rankings

CVEs ranked by EPSS (Exploit Prediction Scoring System) probability. Higher scores mean a greater likelihood of exploitation in the wild within the next 30 days.

164
EPSS > 50%
156
CISA KEV Listed
35,468
CVEs with EPSS
0.7%
Avg EPSS Score
All Critical High Medium Low
Rank CVE ID EPSS Score Percentile CVSS Flags Summary
251 CVE-2025-22462
5.32%
89.8th 9.8 An authentication bypass vulnerability in Ivanti Neurons for ITSM on-premises deployments allows rem
252 CVE-2024-13742
5.11%
89.6th 9.8 The iControlWP WordPress plugin is vulnerable to PHP object injection via deserialization of untrust
253 CVE-2025-23025
5.05%
89.5th 9.0 In XWiki Platform, users with only edit rights can join realtime editing sessions and insert script
254 CVE-2025-29062
4.96%
89.4th 9.8 This vulnerability allows remote attackers to execute arbitrary code on BL-AC2100 routers by exploit
255 CVE-2024-53842
4.94%
89.4th 9.8 This critical vulnerability allows remote attackers to execute arbitrary code on affected Android de
256 CVE-2025-20393
4.91%
89.4th 10.0 KEV An unauthenticated remote attacker can execute arbitrary system commands with root privileges on Cis
257 CVE-2025-59403
4.84%
89.3th 9.8 The Flock Safety Collins Android app exposes unauthenticated administrative API endpoints on port 80
258 CVE-2025-1550
4.79%
89.2th 9.8 CVE-2025-1550 is a critical remote code execution vulnerability in Keras where the Model.load_model
259 CVE-2024-48841
4.78%
89.2th 10.0 This critical vulnerability in FLXEON software allows remote attackers to execute arbitrary code wit
260 CVE-2025-0851
4.71%
89.1th 9.8 A path traversal vulnerability in Deep Java Library's ZipUtils.unzip and TarUtils.untar functions al
261 CVE-2025-22949
4.65%
89.1th 9.8 This vulnerability allows remote attackers to execute arbitrary commands on Tenda AC9 routers by inj
262 CVE-2025-27780
4.6%
89th 9.8 This vulnerability allows remote attackers to execute arbitrary code on Applio voice conversion tool
263 CVE-2024-8673
4.48%
88.8th 9.1 The Z-Downloads WordPress plugin before version 1.11.7 fails to properly validate uploaded SVG files
264 CVE-2025-3439
4.48%
88.8th 9.8 The Everest Forms WordPress plugin is vulnerable to PHP object injection via deserialization of untr
265 CVE-2024-48760
4.4%
88.7th 9.8 CVE-2024-48760 is a critical remote code execution vulnerability in GestioIP v3.5.7 that allows atta
266 CVE-2025-6802
4.36%
88.7th 9.8 This vulnerability allows unauthenticated remote attackers to upload arbitrary files to Marvell QCon
267 CVE-2024-13545
4.31%
88.6th 9.8 The Bootstrap Ultimate WordPress theme contains a Local File Inclusion vulnerability that allows una
268 CVE-2024-57583
4.29%
88.6th 9.8 This CVE describes a command injection vulnerability in Tenda AC18 routers that allows attackers to
269 CVE-2025-1716
4.25%
88.5th 9.8 CVE-2025-1716 is a critical vulnerability in picklescan versions before 0.0.21 where the tool fails
270 CVE-2025-29972
4.21%
88.5th 9.9 This CVE describes a Server-Side Request Forgery (SSRF) vulnerability in Azure services that allows
271 CVE-2025-28256
4.17%
88.4th 9.8 This vulnerability allows remote attackers to execute arbitrary code on TOTOLINK A3100R routers by e
272 CVE-2025-61045
4.13%
88.4th 9.8 This vulnerability allows remote attackers to execute arbitrary commands on TOTOLINK X18 routers by
273 CVE-2025-22912
4.04%
88.2th 9.8 CVE-2025-22912 is a command injection vulnerability in RE11S v1.11 that allows attackers to execute
274 CVE-2025-22906
4.04%
88.2th 9.8 CVE-2025-22906 is a critical command injection vulnerability in RE11S v1.11 that allows attackers to
275 CVE-2025-31477
3.97%
88.1th 9.8 CVE-2025-31477 is a critical vulnerability in Tauri's shell plugin that allows remote code execution
276 CVE-2025-49212
3.93%
88.1th 9.8 This vulnerability allows unauthenticated remote attackers to execute arbitrary code on Trend Micro
277 CVE-2025-45042
3.87%
88th 9.8 This vulnerability allows remote attackers to execute arbitrary commands on Tenda AC9 routers via th
278 CVE-2025-20055
3.84%
87.9th 9.8 This CVE describes an OS command injection vulnerability in Y'S corporation STEALTHONE D220/D340 net
279 CVE-2024-13365
3.74%
87.7th 9.8 The CleanTalk Security & Malware plugin for WordPress has a critical vulnerability allowing unauthen
280 CVE-2024-10553
3.69%
87.7th 9.8 This vulnerability allows unauthenticated remote attackers to execute arbitrary code on H2O-3 machin
281 CVE-2025-0912
3.68%
87.6th 9.8 The Donations Widget WordPress plugin contains a PHP object injection vulnerability that allows unau
282 CVE-2025-43849
3.64%
87.6th 9.8 This vulnerability allows remote attackers to execute arbitrary code on systems running Retrieval-ba
283 CVE-2025-27782
3.64%
87.6th 9.8 Applio voice conversion tool versions 3.2.8-bugfix and prior contain an arbitrary file write vulnera
284 CVE-2025-8324
3.63%
87.6th 9.8 CVE-2025-8324 is an unauthenticated SQL injection vulnerability in Zohocorp ManageEngine Analytics P
285 CVE-2025-59304
3.6%
87.5th 9.8 A directory traversal vulnerability in Swetrix Web Analytics API allows attackers to bypass path res
286 CVE-2023-51951
3.5%
87.3th 9.8 This SQL injection vulnerability in Stock Management System 1.0 allows remote attackers to execute a
287 CVE-2025-43851
3.49%
87.3th 9.8 This vulnerability allows remote code execution through unsafe deserialization in Retrieval-based-Vo
288 CVE-2025-43848
3.49%
87.3th 9.8 CVE-2025-43848 is an unsafe deserialization vulnerability in Retrieval-based-Voice-Conversion-WebUI
289 CVE-2025-43846
3.49%
87.3th 9.8 CVE-2025-43846 is a critical unsafe deserialization vulnerability in Retrieval-based-Voice-Conversio
290 CVE-2025-34221
3.41%
87.2th 9.8 This vulnerability allows unauthenticated attackers to access all internal Docker containers in Vasi
291 CVE-2026-24858
3.41%
87.2th 9.8 KEV This authentication bypass vulnerability allows attackers with a FortiCloud account and registered d
292 CVE-2024-13789
3.39%
87.1th 9.8 The ravpage WordPress plugin is vulnerable to PHP object injection via deserialization of untrusted
293 CVE-2024-12562
3.39%
87.1th 9.8 The s2Member Pro WordPress plugin is vulnerable to PHP object injection via deserialization of untru
294 CVE-2025-27778
3.35%
87th 9.8 Applio versions 3.2.8-bugfix and prior contain an unsafe deserialization vulnerability in infer.py t
295 CVE-2025-44880
3.32%
87th 9.8 This CVE describes a critical command injection vulnerability in Wavlink WL-WN579A3 routers that all
296 CVE-2025-44881
3.32%
87th 9.8 This CVE describes a critical command injection vulnerability in the Wavlink WL-WN579A3 router's QoS
297 CVE-2025-28034
3.26%
86.9th 9.8 This CVE describes a pre-authentication remote command execution vulnerability in multiple TOTOLINK
298 CVE-2025-11005
3.22%
86.7th 9.8 This CVE describes an OS command injection vulnerability in TOTOLINK X6000R routers that allows atta
299 CVE-2024-13448
3.2%
86.7th 9.8 The ThemeREX Addons WordPress plugin allows unauthenticated attackers to upload arbitrary files due
300 CVE-2024-54676
3.19%
86.7th 9.8 Apache OpenMeetings versions 2.1.0 through 7.x have insecure default clustering configurations that

What is EPSS?

The Exploit Prediction Scoring System (EPSS) is a data-driven model developed by FIRST.org that estimates the probability a CVE will be exploited in the wild within the next 30 days. Unlike CVSS which measures severity, EPSS measures likelihood of exploitation — making it ideal for prioritizing which vulnerabilities to patch first.

Why EPSS matters: With thousands of CVEs published monthly, not all vulnerabilities are equally dangerous. EPSS helps security teams focus on the CVEs most likely to be actively exploited, rather than patching solely by CVSS score. A critical CVSS 9.8 vulnerability with 0.1% EPSS may be less urgent than a high CVSS 7.5 with 90% EPSS.

Prioritize by Exploit Risk

Scan your servers and see which vulnerabilities have the highest EPSS scores. Focus on what attackers are actually targeting.

Start Monitoring Free