Most Exploitable CVEs - EPSS Rankings

CVEs ranked by EPSS (Exploit Prediction Scoring System) probability. Higher scores mean a greater likelihood of exploitation in the wild within the next 30 days.

164
EPSS > 50%
156
CISA KEV Listed
35,468
CVEs with EPSS
0.7%
Avg EPSS Score
All Critical High Medium Low
Rank CVE ID EPSS Score Percentile CVSS Flags Summary
3151 CVE-2025-12813
0.38%
59th 9.8 The Holiday Class Post Calendar WordPress plugin has a critical remote code execution vulnerability
3152 CVE-2025-14567
0.38%
59th 5.3 This CVE describes an authentication bypass vulnerability in haxxorsid Stock-Management-System that
3153 CVE-2025-14502
0.38%
59th 9.8 The News and Blog Designer Bundle WordPress plugin has a Local File Inclusion vulnerability that all
3154 CVE-2025-24160
0.38%
59th 4.3 This vulnerability in Apple operating systems allows parsing a malicious file to cause unexpected ap
3155 CVE-2025-24137
0.38%
59th 8.0 This CVE describes a type confusion vulnerability in Apple operating systems that could allow a remo
3156 CVE-2025-24981
0.38%
58.9th 9.3 CVE-2025-24981 is a cross-site scripting (XSS) vulnerability in the MDC markdown parser that allows
3157 CVE-2025-24061
0.38%
59th 7.8 This vulnerability allows local attackers to bypass Windows Mark of the Web (MOTW) security protecti
3158 CVE-2025-7645
0.38%
58.9th 8.1 The Extensions For CF7 WordPress plugin has an arbitrary file deletion vulnerability that allows una
3159 CVE-2025-7921
0.38%
58.9th 9.8 This critical vulnerability affects certain Askey modem models, allowing unauthenticated remote atta
3160 CVE-2025-67418
0.38%
59th 9.8 ClipBucket 5.5.2 ships with hardcoded default administrative credentials, allowing unauthenticated r
3161 CVE-2023-53921
0.38%
58.9th 9.8 SitemagicCMS 4.4.3 contains an unrestricted file upload vulnerability that allows attackers to uploa
3162 CVE-2025-21490
0.38%
58.9th 4.9 This vulnerability in MySQL Server's InnoDB component allows high-privileged attackers with network
3163 CVE-2023-45275
0.38%
58.9th 6.5 This vulnerability allows attackers to bypass authorization controls in Kali Forms WordPress plugin,
3164 CVE-2024-12610
0.38%
58.9th 5.3 This vulnerability in the School Management System for WordPress plugin allows unauthenticated attac
3165 CVE-2025-1930
0.38%
58.9th 8.8 A use-after-free vulnerability in Firefox and Thunderbird on Windows allows a compromised content pr
3166 CVE-2024-56156
0.38%
58.9th 9.0 This vulnerability in Halo website building software allows attackers to bypass file upload validati
3167 CVE-2025-39557
0.38%
58.9th 9.1 This vulnerability allows unauthenticated attackers to upload arbitrary files, including web shells,
3168 CVE-2025-30724
0.38%
58.9th 7.5 An unauthenticated vulnerability in Oracle BI Publisher's XML Services allows remote attackers to ac
3169 CVE-2025-32202
0.38%
58.9th 9.1 This vulnerability allows unauthenticated attackers to upload arbitrary files, including web shells,
3170 CVE-2025-31002
0.38%
58.9th 9.1 CVE-2025-31002 is an arbitrary file upload vulnerability in the Squeeze WordPress plugin that allows
3171 CVE-2025-31480
0.38%
58.9th 9.1 This is a privilege escalation vulnerability in the aiven-extras PostgreSQL extension that allows at
3172 CVE-2025-4413
0.38%
58.9th 8.8 The Pixabay Images WordPress plugin allows authenticated attackers with Author-level access or highe
3173 CVE-2025-60803
0.38%
58.9th 9.8 Antabot White-Jotter contains an unauthenticated remote code execution vulnerability that allows att
3174 CVE-2025-12903
0.38%
58.9th 7.5 This vulnerability allows unauthenticated attackers to bypass authorization and retrieve payment met
3175 CVE-2026-25539
0.38%
58.9th 9.1 This vulnerability allows authenticated users of SiYuan personal knowledge management system to writ
3176 CVE-2025-26201
0.38%
58.8th 9.1 GreaterWMS versions up to 2.1.49 contain an authentication bypass vulnerability in the /staff route
3177 CVE-2024-38988
0.38%
58.8th 9.8 CVE-2024-38988 is a prototype pollution vulnerability in alizeait unflatto versions up to 1.0.2 that
3178 CVE-2025-32034
0.38%
58.8th 7.5 A denial-of-service vulnerability in Apollo Router Core allows attackers to craft GraphQL queries wi
3179 CVE-2025-32032
0.38%
58.8th 7.5 A denial-of-service vulnerability in Apollo Router allows attackers to craft GraphQL queries with de
3180 CVE-2025-4354
0.38%
58.8th 8.8 A critical stack-based buffer overflow vulnerability in Tenda DAP-1520 routers allows remote attacke
3181 CVE-2025-49083
0.38%
58.8th 7.2 CVE-2025-49083 is a deserialization vulnerability in Absolute Secure Access management console that
3182 CVE-2025-3743
0.38%
58.8th 5.3 The Upsell Funnel Builder for WooCommerce WordPress plugin allows unauthenticated attackers to manip
3183 CVE-2025-31215
0.38%
58.7th 6.5 This vulnerability allows malicious web content to cause unexpected process crashes in Apple's Safar
3184 CVE-2025-8978
0.38%
58.7th 6.6 This vulnerability in D-Link DIR-619L routers allows attackers to upload malicious firmware due to i
3185 CVE-2024-54761
0.38%
58.7th 6.3 BigAnt Office Messenger 5.6.06 contains a SQL injection vulnerability in the 'dev_code' parameter th
3186 CVE-2025-2742
0.38%
58.7th 5.4 This critical vulnerability in ruoyi-vue-pro 2.4.1 allows remote attackers to perform path traversal
3187 CVE-2025-30580
0.38%
58.7th 10.0 This critical vulnerability allows remote attackers to execute arbitrary code on systems running vul
3188 CVE-2025-43879
0.38%
58.7th 9.8 This critical vulnerability allows remote unauthenticated attackers to execute arbitrary operating s
3189 CVE-2025-63951
0.38%
58.7th 7.5 This CVE describes an insecure deserialization vulnerability in the MiczFlor RPi-Jukebox-RFID projec
3190 CVE-2025-63950
0.38%
58.7th 7.5 An insecure deserialization vulnerability in Twittodon's download.php script allows remote, unauthen
3191 CVE-2025-15502
0.38%
58.6th 7.3 This CVE describes a remote command injection vulnerability in Sangfor Operation and Maintenance Man
3192 CVE-2025-1039
0.38%
58.6th 7.2 The Lenix Elementor Leads addon plugin for WordPress has a stored XSS vulnerability in URL form fiel
3193 CVE-2024-13539
0.38%
58.6th 5.3 The AForms Eats WordPress plugin discloses full server path information through a publicly accessibl
3194 CVE-2025-21198
0.38%
58.6th 9.0 This vulnerability allows remote attackers to execute arbitrary code on Microsoft HPC Pack systems w
3195 CVE-2024-54291
0.38%
58.6th 8.6 This path traversal vulnerability in the PluginPass WordPress plugin allows attackers to manipulate
3196 CVE-2024-11283
0.38%
58.6th 7.5 The WP JobHunt plugin for WordPress has an authentication bypass vulnerability that allows unauthent
3197 CVE-2025-24056
0.38%
58.6th 8.8 A heap-based buffer overflow vulnerability in Windows Telephony Server allows remote attackers to ex
3198 CVE-2023-42961
0.38%
58.6th 6.3 This vulnerability allows a sandboxed process to bypass sandbox restrictions through a path handling
3199 CVE-2025-32633
0.38%
58.6th 8.6 This path traversal vulnerability in the neoslab Database Toolset WordPress plugin allows attackers
3200 CVE-2025-32631
0.38%
58.6th 8.6 This path traversal vulnerability in Oxygen MyData for WooCommerce allows attackers to delete arbitr

What is EPSS?

The Exploit Prediction Scoring System (EPSS) is a data-driven model developed by FIRST.org that estimates the probability a CVE will be exploited in the wild within the next 30 days. Unlike CVSS which measures severity, EPSS measures likelihood of exploitation — making it ideal for prioritizing which vulnerabilities to patch first.

Why EPSS matters: With thousands of CVEs published monthly, not all vulnerabilities are equally dangerous. EPSS helps security teams focus on the CVEs most likely to be actively exploited, rather than patching solely by CVSS score. A critical CVSS 9.8 vulnerability with 0.1% EPSS may be less urgent than a high CVSS 7.5 with 90% EPSS.

Prioritize by Exploit Risk

Scan your servers and see which vulnerabilities have the highest EPSS scores. Focus on what attackers are actually targeting.

Start Monitoring Free