Most Exploitable CVEs - EPSS Rankings
CVEs ranked by EPSS (Exploit Prediction Scoring System) probability. Higher scores mean a greater likelihood of exploitation in the wild within the next 30 days.
| Rank | CVE ID | EPSS Score | Percentile | CVSS | Flags | Summary |
|---|---|---|---|---|---|---|
| 3151 | CVE-2025-12813 |
|
59th | 9.8 | The Holiday Class Post Calendar WordPress plugin has a critical remote code execution vulnerability | |
| 3152 | CVE-2025-14567 |
|
59th | 5.3 | This CVE describes an authentication bypass vulnerability in haxxorsid Stock-Management-System that | |
| 3153 | CVE-2025-14502 |
|
59th | 9.8 | The News and Blog Designer Bundle WordPress plugin has a Local File Inclusion vulnerability that all | |
| 3154 | CVE-2025-24160 |
|
59th | 4.3 | This vulnerability in Apple operating systems allows parsing a malicious file to cause unexpected ap | |
| 3155 | CVE-2025-24137 |
|
59th | 8.0 | This CVE describes a type confusion vulnerability in Apple operating systems that could allow a remo | |
| 3156 | CVE-2025-24981 |
|
58.9th | 9.3 | CVE-2025-24981 is a cross-site scripting (XSS) vulnerability in the MDC markdown parser that allows | |
| 3157 | CVE-2025-24061 |
|
59th | 7.8 | This vulnerability allows local attackers to bypass Windows Mark of the Web (MOTW) security protecti | |
| 3158 | CVE-2025-7645 |
|
58.9th | 8.1 | The Extensions For CF7 WordPress plugin has an arbitrary file deletion vulnerability that allows una | |
| 3159 | CVE-2025-7921 |
|
58.9th | 9.8 | This critical vulnerability affects certain Askey modem models, allowing unauthenticated remote atta | |
| 3160 | CVE-2025-67418 |
|
59th | 9.8 | ClipBucket 5.5.2 ships with hardcoded default administrative credentials, allowing unauthenticated r | |
| 3161 | CVE-2023-53921 |
|
58.9th | 9.8 | SitemagicCMS 4.4.3 contains an unrestricted file upload vulnerability that allows attackers to uploa | |
| 3162 | CVE-2025-21490 |
|
58.9th | 4.9 | This vulnerability in MySQL Server's InnoDB component allows high-privileged attackers with network | |
| 3163 | CVE-2023-45275 |
|
58.9th | 6.5 | This vulnerability allows attackers to bypass authorization controls in Kali Forms WordPress plugin, | |
| 3164 | CVE-2024-12610 |
|
58.9th | 5.3 | This vulnerability in the School Management System for WordPress plugin allows unauthenticated attac | |
| 3165 | CVE-2025-1930 |
|
58.9th | 8.8 | A use-after-free vulnerability in Firefox and Thunderbird on Windows allows a compromised content pr | |
| 3166 | CVE-2024-56156 |
|
58.9th | 9.0 | This vulnerability in Halo website building software allows attackers to bypass file upload validati | |
| 3167 | CVE-2025-39557 |
|
58.9th | 9.1 | This vulnerability allows unauthenticated attackers to upload arbitrary files, including web shells, | |
| 3168 | CVE-2025-30724 |
|
58.9th | 7.5 | An unauthenticated vulnerability in Oracle BI Publisher's XML Services allows remote attackers to ac | |
| 3169 | CVE-2025-32202 |
|
58.9th | 9.1 | This vulnerability allows unauthenticated attackers to upload arbitrary files, including web shells, | |
| 3170 | CVE-2025-31002 |
|
58.9th | 9.1 | CVE-2025-31002 is an arbitrary file upload vulnerability in the Squeeze WordPress plugin that allows | |
| 3171 | CVE-2025-31480 |
|
58.9th | 9.1 | This is a privilege escalation vulnerability in the aiven-extras PostgreSQL extension that allows at | |
| 3172 | CVE-2025-4413 |
|
58.9th | 8.8 | The Pixabay Images WordPress plugin allows authenticated attackers with Author-level access or highe | |
| 3173 | CVE-2025-60803 |
|
58.9th | 9.8 | Antabot White-Jotter contains an unauthenticated remote code execution vulnerability that allows att | |
| 3174 | CVE-2025-12903 |
|
58.9th | 7.5 | This vulnerability allows unauthenticated attackers to bypass authorization and retrieve payment met | |
| 3175 | CVE-2026-25539 |
|
58.9th | 9.1 | This vulnerability allows authenticated users of SiYuan personal knowledge management system to writ | |
| 3176 | CVE-2025-26201 |
|
58.8th | 9.1 | GreaterWMS versions up to 2.1.49 contain an authentication bypass vulnerability in the /staff route | |
| 3177 | CVE-2024-38988 |
|
58.8th | 9.8 | CVE-2024-38988 is a prototype pollution vulnerability in alizeait unflatto versions up to 1.0.2 that | |
| 3178 | CVE-2025-32034 |
|
58.8th | 7.5 | A denial-of-service vulnerability in Apollo Router Core allows attackers to craft GraphQL queries wi | |
| 3179 | CVE-2025-32032 |
|
58.8th | 7.5 | A denial-of-service vulnerability in Apollo Router allows attackers to craft GraphQL queries with de | |
| 3180 | CVE-2025-4354 |
|
58.8th | 8.8 | A critical stack-based buffer overflow vulnerability in Tenda DAP-1520 routers allows remote attacke | |
| 3181 | CVE-2025-49083 |
|
58.8th | 7.2 | CVE-2025-49083 is a deserialization vulnerability in Absolute Secure Access management console that | |
| 3182 | CVE-2025-3743 |
|
58.8th | 5.3 | The Upsell Funnel Builder for WooCommerce WordPress plugin allows unauthenticated attackers to manip | |
| 3183 | CVE-2025-31215 |
|
58.7th | 6.5 | This vulnerability allows malicious web content to cause unexpected process crashes in Apple's Safar | |
| 3184 | CVE-2025-8978 |
|
58.7th | 6.6 | This vulnerability in D-Link DIR-619L routers allows attackers to upload malicious firmware due to i | |
| 3185 | CVE-2024-54761 |
|
58.7th | 6.3 | BigAnt Office Messenger 5.6.06 contains a SQL injection vulnerability in the 'dev_code' parameter th | |
| 3186 | CVE-2025-2742 |
|
58.7th | 5.4 | This critical vulnerability in ruoyi-vue-pro 2.4.1 allows remote attackers to perform path traversal | |
| 3187 | CVE-2025-30580 |
|
58.7th | 10.0 | This critical vulnerability allows remote attackers to execute arbitrary code on systems running vul | |
| 3188 | CVE-2025-43879 |
|
58.7th | 9.8 | This critical vulnerability allows remote unauthenticated attackers to execute arbitrary operating s | |
| 3189 | CVE-2025-63951 |
|
58.7th | 7.5 | This CVE describes an insecure deserialization vulnerability in the MiczFlor RPi-Jukebox-RFID projec | |
| 3190 | CVE-2025-63950 |
|
58.7th | 7.5 | An insecure deserialization vulnerability in Twittodon's download.php script allows remote, unauthen | |
| 3191 | CVE-2025-15502 |
|
58.6th | 7.3 | This CVE describes a remote command injection vulnerability in Sangfor Operation and Maintenance Man | |
| 3192 | CVE-2025-1039 |
|
58.6th | 7.2 | The Lenix Elementor Leads addon plugin for WordPress has a stored XSS vulnerability in URL form fiel | |
| 3193 | CVE-2024-13539 |
|
58.6th | 5.3 | The AForms Eats WordPress plugin discloses full server path information through a publicly accessibl | |
| 3194 | CVE-2025-21198 |
|
58.6th | 9.0 | This vulnerability allows remote attackers to execute arbitrary code on Microsoft HPC Pack systems w | |
| 3195 | CVE-2024-54291 |
|
58.6th | 8.6 | This path traversal vulnerability in the PluginPass WordPress plugin allows attackers to manipulate | |
| 3196 | CVE-2024-11283 |
|
58.6th | 7.5 | The WP JobHunt plugin for WordPress has an authentication bypass vulnerability that allows unauthent | |
| 3197 | CVE-2025-24056 |
|
58.6th | 8.8 | A heap-based buffer overflow vulnerability in Windows Telephony Server allows remote attackers to ex | |
| 3198 | CVE-2023-42961 |
|
58.6th | 6.3 | This vulnerability allows a sandboxed process to bypass sandbox restrictions through a path handling | |
| 3199 | CVE-2025-32633 |
|
58.6th | 8.6 | This path traversal vulnerability in the neoslab Database Toolset WordPress plugin allows attackers | |
| 3200 | CVE-2025-32631 |
|
58.6th | 8.6 | This path traversal vulnerability in Oxygen MyData for WooCommerce allows attackers to delete arbitr |
What is EPSS?
The Exploit Prediction Scoring System (EPSS) is a data-driven model developed by FIRST.org that estimates the probability a CVE will be exploited in the wild within the next 30 days. Unlike CVSS which measures severity, EPSS measures likelihood of exploitation — making it ideal for prioritizing which vulnerabilities to patch first.
Why EPSS matters: With thousands of CVEs published monthly, not all vulnerabilities are equally dangerous. EPSS helps security teams focus on the CVEs most likely to be actively exploited, rather than patching solely by CVSS score. A critical CVSS 9.8 vulnerability with 0.1% EPSS may be less urgent than a high CVSS 7.5 with 90% EPSS.
Prioritize by Exploit Risk
Scan your servers and see which vulnerabilities have the highest EPSS scores. Focus on what attackers are actually targeting.
Start Monitoring Free