Most Exploitable CVEs - EPSS Rankings

CVEs ranked by EPSS (Exploit Prediction Scoring System) probability. Higher scores mean a greater likelihood of exploitation in the wild within the next 30 days.

164
EPSS > 50%
156
CISA KEV Listed
35,468
CVEs with EPSS
0.7%
Avg EPSS Score
All Critical High Medium Low
Rank CVE ID EPSS Score Percentile CVSS Flags Summary
3201 CVE-2024-13178
0.1%
26.7th 4.3 This vulnerability allows attackers to create fake fullscreen interfaces that mimic legitimate websi
3202 CVE-2024-11919
0.1%
26.7th 4.3 This vulnerability allows attackers to create deceptive user interfaces in Google Chrome on Android
3203 CVE-2025-11260
0.1%
26.9th 5.3 The WP Headless CMS Framework plugin for WordPress has an authentication bypass vulnerability that a
3204 CVE-2025-11072
0.1%
26.7th 5.3 The MelAbu WP Download Counter Button WordPress plugin through version 1.8.6.7 contains a path trave
3205 CVE-2025-68129
0.1%
26.7th 6.8 Auth0-PHP SDK versions 8.0.0 through 8.17.0 improperly validate audience claims in access tokens, al
3206 CVE-2025-11991
0.1%
26.8th 5.3 This vulnerability allows unauthenticated attackers to abuse the JetFormBuilder WordPress plugin's A
3207 CVE-2025-60538
0.1%
26.7th 6.5 CVE-2025-60538 is an authentication bypass vulnerability in shiori bookmark manager versions 1.7.4 a
3208 CVE-2026-21690
0.1%
26.8th 6.3 CVE-2026-21690 is a type confusion vulnerability in iccDEV's CIccTagXmlTagData::ToXml() function tha
3209 CVE-2025-14118
0.1%
26.8th 6.1 The Starred Review WordPress plugin contains a reflected cross-site scripting vulnerability that all
3210 CVE-2024-35144
0.1%
26.6th 5.3 IBM Maximo Application Suite's Monitor Component stores source code files on the web server that cou
3211 CVE-2025-0697
0.1%
26.6th 5.3 This vulnerability in Telstra Smart Modem Gen 2 allows remote attackers to inject malicious content
3212 CVE-2025-21530
0.1%
26.6th 4.3 This vulnerability in Oracle PeopleSoft Enterprise PeopleTools allows authenticated attackers with l
3213 CVE-2024-8722
0.1%
26.5th 5.5 This vulnerability allows authenticated WordPress administrators to upload malicious SVG files conta
3214 CVE-2023-42243
0.1%
26.6th 5.4 This vulnerability allows authenticated users in Selesta Visual Access Manager to access an administ
3215 CVE-2025-0392
0.1%
26.6th 6.3 This critical SQL injection vulnerability in Jeewms allows remote attackers to execute arbitrary SQL
3216 CVE-2024-56445
0.1%
26.6th 4.3 This CVE describes an instruction authentication bypass vulnerability in Huawei's Findnetwork module
3217 CVE-2024-45640
0.1%
26.6th 5.3 IBM Security ReaQta 3.12 discloses sensitive information in HTTP responses that could aid attackers
3218 CVE-2024-12545
0.1%
26.6th 5.4 This CSRF vulnerability in the Scratch & Win WordPress plugin allows unauthenticated attackers to re
3219 CVE-2025-24872
0.1%
26.6th 4.3 This vulnerability in SAP ABAP Platform's ABAP Build Framework allows authenticated attackers to acc
3220 CVE-2025-31191
0.1%
26.6th 5.5 This CVE describes an information disclosure vulnerability in Apple operating systems where an app c
3221 CVE-2019-16149
0.1%
26.6th 5.5 CVE-2019-16149 is a cross-site scripting (XSS) vulnerability in FortiClientEMS version 6.2.0 that al
3222 CVE-2024-12623
0.1%
26.5th 6.4 The DICOM Support WordPress plugin has a stored XSS vulnerability in all versions up to 0.10.6. Auth
3223 CVE-2024-12109
0.1%
26.7th 4.1 This vulnerability allows WordPress administrators to perform SQL injection attacks through the Prod
3224 CVE-2024-10638
0.1%
26.7th 4.1 This vulnerability allows authenticated WordPress administrators to perform SQL injection attacks in
3225 CVE-2025-30581
0.1%
26.5th 5.3 This CVE describes a missing authorization vulnerability in the PluginOps Top Bar WordPress plugin t
3226 CVE-2024-11167
0.1%
26.6th 5.3 An improper access control vulnerability in LibreChat allows authenticated users to delete other use
3227 CVE-2025-26924
0.1%
26.7th 6.5 This vulnerability allows attackers to inject malicious code through shortcodes in the Ohio Extra Wo
3228 CVE-2025-1921
0.1%
26.6th 6.5 This vulnerability in Google Chrome's Media Stream implementation allows a remote attacker to gather
3229 CVE-2025-31354
0.1%
26.6th 4.3 This vulnerability in Subnet Solutions PowerSYSTEM Center's SMTPS notification service allows attack
3230 CVE-2025-2440
0.1%
26.6th 4.2 A CWE-922 vulnerability in Schneider Electric products allows unauthorized access to sensitive infor
3231 CVE-2025-3359
0.1%
26.7th 6.2 A segmentation fault vulnerability in GNUPlot's IO_str_init_static_internal function allows attacker
3232 CVE-2024-13941
0.1%
26.6th 5.3 This is a critical memory corruption vulnerability in the ouch archive utility's ZIP date-time parsi
3233 CVE-2025-40918
0.1%
26.7th 6.5 This vulnerability in Authen::SASL::Perl::DIGEST_MD5 generates client nonces (cnonce) with insuffici
3234 CVE-2025-7625
0.1%
26.7th 4.3 This critical vulnerability in YiJiuSmile kkFileViewOfficeEdit allows remote attackers to perform pa
3235 CVE-2024-42649
0.1%
26.6th 6.5 NanoMQ v0.22.10 contains a memory leak vulnerability in its MQTT PUBLISH message handling. Attackers
3236 CVE-2025-54819
0.1%
26.6th 6.5 A path traversal vulnerability in SS1 Ver.16.0.0.10 and earlier allows remote authenticated attacker
3237 CVE-2025-8980
0.1%
26.6th 6.6 This vulnerability in Tenda G1 routers allows attackers to upload malicious firmware due to insuffic
3238 CVE-2025-57692
0.1%
26.6th 6.8 PiranhaCMS 12.0 contains a stored cross-site scripting (XSS) vulnerability in the Text content block
3239 CVE-2025-11975
0.1%
26.5th 4.3 The FuseWP WordPress plugin has an authorization bypass vulnerability that allows unauthenticated at
3240 CVE-2025-13441
0.1%
26.6th 5.3 The Hide Category by User Role for WooCommerce WordPress plugin has a missing authorization vulnerab
3241 CVE-2025-60737
0.1%
26.7th 6.1 This Cross-Site Scripting (XSS) vulnerability in Ilevia EVE X1 Server firmware allows remote attacke
3242 CVE-2025-9479
0.1%
26.5th 4.3 An out-of-bounds read vulnerability in Chrome's V8 JavaScript engine allows remote attackers to pote
3243 CVE-2025-11758
0.1%
26.6th 6.5 The All in One Time Clock Lite WordPress plugin up to version 2.0.3 allows unauthenticated attackers
3244 CVE-2025-11816
0.1%
26.6th 5.3 This vulnerability in the WP Legal Pages WordPress plugin allows unauthenticated attackers to discon
3245 CVE-2025-67741
0.1%
26.6th 4.6 This stored cross-site scripting (XSS) vulnerability in JetBrains TeamCity allows attackers to injec
3246 CVE-2025-12084
0.1%
26.5th 5.3 CVE-2025-12084 is a denial-of-service vulnerability in Python's xml.dom.minidom module where buildin
3247 CVE-2026-1643
0.1%
26.5th 6.1 The MP-Ukagaka WordPress plugin is vulnerable to Reflected Cross-Site Scripting (XSS) in all version
3248 CVE-2026-1634
0.1%
26.5th 6.1 This vulnerability allows unauthenticated attackers to inject malicious scripts into WordPress pages
3249 CVE-2025-66305
0.1%
26.7th 4.9 A Denial of Service vulnerability in Grav's admin panel allows attackers to crash the entire web app
3250 CVE-2024-54520
0.09%
26.4th 5.5 This CVE describes a path validation vulnerability in macOS that allows malicious applications to ov

What is EPSS?

The Exploit Prediction Scoring System (EPSS) is a data-driven model developed by FIRST.org that estimates the probability a CVE will be exploited in the wild within the next 30 days. Unlike CVSS which measures severity, EPSS measures likelihood of exploitation — making it ideal for prioritizing which vulnerabilities to patch first.

Why EPSS matters: With thousands of CVEs published monthly, not all vulnerabilities are equally dangerous. EPSS helps security teams focus on the CVEs most likely to be actively exploited, rather than patching solely by CVSS score. A critical CVSS 9.8 vulnerability with 0.1% EPSS may be less urgent than a high CVSS 7.5 with 90% EPSS.

Prioritize by Exploit Risk

Scan your servers and see which vulnerabilities have the highest EPSS scores. Focus on what attackers are actually targeting.

Start Monitoring Free