Most Exploitable CVEs - EPSS Rankings
CVEs ranked by EPSS (Exploit Prediction Scoring System) probability. Higher scores mean a greater likelihood of exploitation in the wild within the next 30 days.
| Rank | CVE ID | EPSS Score | Percentile | CVSS | Flags | Summary |
|---|---|---|---|---|---|---|
| 3201 | CVE-2024-13178 |
|
26.7th | 4.3 | This vulnerability allows attackers to create fake fullscreen interfaces that mimic legitimate websi | |
| 3202 | CVE-2024-11919 |
|
26.7th | 4.3 | This vulnerability allows attackers to create deceptive user interfaces in Google Chrome on Android | |
| 3203 | CVE-2025-11260 |
|
26.9th | 5.3 | The WP Headless CMS Framework plugin for WordPress has an authentication bypass vulnerability that a | |
| 3204 | CVE-2025-11072 |
|
26.7th | 5.3 | The MelAbu WP Download Counter Button WordPress plugin through version 1.8.6.7 contains a path trave | |
| 3205 | CVE-2025-68129 |
|
26.7th | 6.8 | Auth0-PHP SDK versions 8.0.0 through 8.17.0 improperly validate audience claims in access tokens, al | |
| 3206 | CVE-2025-11991 |
|
26.8th | 5.3 | This vulnerability allows unauthenticated attackers to abuse the JetFormBuilder WordPress plugin's A | |
| 3207 | CVE-2025-60538 |
|
26.7th | 6.5 | CVE-2025-60538 is an authentication bypass vulnerability in shiori bookmark manager versions 1.7.4 a | |
| 3208 | CVE-2026-21690 |
|
26.8th | 6.3 | CVE-2026-21690 is a type confusion vulnerability in iccDEV's CIccTagXmlTagData::ToXml() function tha | |
| 3209 | CVE-2025-14118 |
|
26.8th | 6.1 | The Starred Review WordPress plugin contains a reflected cross-site scripting vulnerability that all | |
| 3210 | CVE-2024-35144 |
|
26.6th | 5.3 | IBM Maximo Application Suite's Monitor Component stores source code files on the web server that cou | |
| 3211 | CVE-2025-0697 |
|
26.6th | 5.3 | This vulnerability in Telstra Smart Modem Gen 2 allows remote attackers to inject malicious content | |
| 3212 | CVE-2025-21530 |
|
26.6th | 4.3 | This vulnerability in Oracle PeopleSoft Enterprise PeopleTools allows authenticated attackers with l | |
| 3213 | CVE-2024-8722 |
|
26.5th | 5.5 | This vulnerability allows authenticated WordPress administrators to upload malicious SVG files conta | |
| 3214 | CVE-2023-42243 |
|
26.6th | 5.4 | This vulnerability allows authenticated users in Selesta Visual Access Manager to access an administ | |
| 3215 | CVE-2025-0392 |
|
26.6th | 6.3 | This critical SQL injection vulnerability in Jeewms allows remote attackers to execute arbitrary SQL | |
| 3216 | CVE-2024-56445 |
|
26.6th | 4.3 | This CVE describes an instruction authentication bypass vulnerability in Huawei's Findnetwork module | |
| 3217 | CVE-2024-45640 |
|
26.6th | 5.3 | IBM Security ReaQta 3.12 discloses sensitive information in HTTP responses that could aid attackers | |
| 3218 | CVE-2024-12545 |
|
26.6th | 5.4 | This CSRF vulnerability in the Scratch & Win WordPress plugin allows unauthenticated attackers to re | |
| 3219 | CVE-2025-24872 |
|
26.6th | 4.3 | This vulnerability in SAP ABAP Platform's ABAP Build Framework allows authenticated attackers to acc | |
| 3220 | CVE-2025-31191 |
|
26.6th | 5.5 | This CVE describes an information disclosure vulnerability in Apple operating systems where an app c | |
| 3221 | CVE-2019-16149 |
|
26.6th | 5.5 | CVE-2019-16149 is a cross-site scripting (XSS) vulnerability in FortiClientEMS version 6.2.0 that al | |
| 3222 | CVE-2024-12623 |
|
26.5th | 6.4 | The DICOM Support WordPress plugin has a stored XSS vulnerability in all versions up to 0.10.6. Auth | |
| 3223 | CVE-2024-12109 |
|
26.7th | 4.1 | This vulnerability allows WordPress administrators to perform SQL injection attacks through the Prod | |
| 3224 | CVE-2024-10638 |
|
26.7th | 4.1 | This vulnerability allows authenticated WordPress administrators to perform SQL injection attacks in | |
| 3225 | CVE-2025-30581 |
|
26.5th | 5.3 | This CVE describes a missing authorization vulnerability in the PluginOps Top Bar WordPress plugin t | |
| 3226 | CVE-2024-11167 |
|
26.6th | 5.3 | An improper access control vulnerability in LibreChat allows authenticated users to delete other use | |
| 3227 | CVE-2025-26924 |
|
26.7th | 6.5 | This vulnerability allows attackers to inject malicious code through shortcodes in the Ohio Extra Wo | |
| 3228 | CVE-2025-1921 |
|
26.6th | 6.5 | This vulnerability in Google Chrome's Media Stream implementation allows a remote attacker to gather | |
| 3229 | CVE-2025-31354 |
|
26.6th | 4.3 | This vulnerability in Subnet Solutions PowerSYSTEM Center's SMTPS notification service allows attack | |
| 3230 | CVE-2025-2440 |
|
26.6th | 4.2 | A CWE-922 vulnerability in Schneider Electric products allows unauthorized access to sensitive infor | |
| 3231 | CVE-2025-3359 |
|
26.7th | 6.2 | A segmentation fault vulnerability in GNUPlot's IO_str_init_static_internal function allows attacker | |
| 3232 | CVE-2024-13941 |
|
26.6th | 5.3 | This is a critical memory corruption vulnerability in the ouch archive utility's ZIP date-time parsi | |
| 3233 | CVE-2025-40918 |
|
26.7th | 6.5 | This vulnerability in Authen::SASL::Perl::DIGEST_MD5 generates client nonces (cnonce) with insuffici | |
| 3234 | CVE-2025-7625 |
|
26.7th | 4.3 | This critical vulnerability in YiJiuSmile kkFileViewOfficeEdit allows remote attackers to perform pa | |
| 3235 | CVE-2024-42649 |
|
26.6th | 6.5 | NanoMQ v0.22.10 contains a memory leak vulnerability in its MQTT PUBLISH message handling. Attackers | |
| 3236 | CVE-2025-54819 |
|
26.6th | 6.5 | A path traversal vulnerability in SS1 Ver.16.0.0.10 and earlier allows remote authenticated attacker | |
| 3237 | CVE-2025-8980 |
|
26.6th | 6.6 | This vulnerability in Tenda G1 routers allows attackers to upload malicious firmware due to insuffic | |
| 3238 | CVE-2025-57692 |
|
26.6th | 6.8 | PiranhaCMS 12.0 contains a stored cross-site scripting (XSS) vulnerability in the Text content block | |
| 3239 | CVE-2025-11975 |
|
26.5th | 4.3 | The FuseWP WordPress plugin has an authorization bypass vulnerability that allows unauthenticated at | |
| 3240 | CVE-2025-13441 |
|
26.6th | 5.3 | The Hide Category by User Role for WooCommerce WordPress plugin has a missing authorization vulnerab | |
| 3241 | CVE-2025-60737 |
|
26.7th | 6.1 | This Cross-Site Scripting (XSS) vulnerability in Ilevia EVE X1 Server firmware allows remote attacke | |
| 3242 | CVE-2025-9479 |
|
26.5th | 4.3 | An out-of-bounds read vulnerability in Chrome's V8 JavaScript engine allows remote attackers to pote | |
| 3243 | CVE-2025-11758 |
|
26.6th | 6.5 | The All in One Time Clock Lite WordPress plugin up to version 2.0.3 allows unauthenticated attackers | |
| 3244 | CVE-2025-11816 |
|
26.6th | 5.3 | This vulnerability in the WP Legal Pages WordPress plugin allows unauthenticated attackers to discon | |
| 3245 | CVE-2025-67741 |
|
26.6th | 4.6 | This stored cross-site scripting (XSS) vulnerability in JetBrains TeamCity allows attackers to injec | |
| 3246 | CVE-2025-12084 |
|
26.5th | 5.3 | CVE-2025-12084 is a denial-of-service vulnerability in Python's xml.dom.minidom module where buildin | |
| 3247 | CVE-2026-1643 |
|
26.5th | 6.1 | The MP-Ukagaka WordPress plugin is vulnerable to Reflected Cross-Site Scripting (XSS) in all version | |
| 3248 | CVE-2026-1634 |
|
26.5th | 6.1 | This vulnerability allows unauthenticated attackers to inject malicious scripts into WordPress pages | |
| 3249 | CVE-2025-66305 |
|
26.7th | 4.9 | A Denial of Service vulnerability in Grav's admin panel allows attackers to crash the entire web app | |
| 3250 | CVE-2024-54520 |
|
26.4th | 5.5 | This CVE describes a path validation vulnerability in macOS that allows malicious applications to ov |
What is EPSS?
The Exploit Prediction Scoring System (EPSS) is a data-driven model developed by FIRST.org that estimates the probability a CVE will be exploited in the wild within the next 30 days. Unlike CVSS which measures severity, EPSS measures likelihood of exploitation — making it ideal for prioritizing which vulnerabilities to patch first.
Why EPSS matters: With thousands of CVEs published monthly, not all vulnerabilities are equally dangerous. EPSS helps security teams focus on the CVEs most likely to be actively exploited, rather than patching solely by CVSS score. A critical CVSS 9.8 vulnerability with 0.1% EPSS may be less urgent than a high CVSS 7.5 with 90% EPSS.
Prioritize by Exploit Risk
Scan your servers and see which vulnerabilities have the highest EPSS scores. Focus on what attackers are actually targeting.
Start Monitoring Free