Most Exploitable CVEs - EPSS Rankings

CVEs ranked by EPSS (Exploit Prediction Scoring System) probability. Higher scores mean a greater likelihood of exploitation in the wild within the next 30 days.

164
EPSS > 50%
156
CISA KEV Listed
35,468
CVEs with EPSS
0.7%
Avg EPSS Score
All Critical High Medium Low
Rank CVE ID EPSS Score Percentile CVSS Flags Summary
3251 CVE-2025-24744
0.09%
26.5th 4.3 CVE-2025-24744 is a missing authorization vulnerability in the Bridge Core WordPress plugin that all
3252 CVE-2025-24754
0.09%
26.5th 4.3 This CVE describes a missing authorization vulnerability in the Houzez WordPress theme that allows u
3253 CVE-2025-24693
0.09%
26.5th 4.3 This CVE describes a missing authorization vulnerability in the Yehi Advanced Notifications WordPres
3254 CVE-2025-23962
0.09%
26.5th 4.3 This CVE describes a Missing Authorization vulnerability in the Goldstar WordPress plugin that allow
3255 CVE-2025-23957
0.09%
26.5th 4.3 This CVE describes a Missing Authorization vulnerability in the Sur.ly WordPress plugin that allows
3256 CVE-2025-23954
0.09%
26.5th 4.3 This CVE describes a missing authorization vulnerability in the Salvador AI Image Generator WordPres
3257 CVE-2025-23929
0.09%
26.5th 4.3 This CVE describes a Missing Authorization vulnerability in the wishfulthemes Email Capture & Lead G
3258 CVE-2025-23423
0.09%
26.5th 4.3 This CVE describes a Missing Authorization vulnerability in the SendGrid for WordPress plugin that a
3259 CVE-2025-0480
0.09%
26.5th 4.3 This CVE-2025-0480 vulnerability in wuzhicms 4.1.0 allows attackers to perform server-side request f
3260 CVE-2025-22779
0.09%
26.5th 4.3 This CVE describes a Missing Authorization vulnerability in the WP News Sliders WordPress plugin tha
3261 CVE-2025-0058
0.09%
26.4th 6.5 This vulnerability allows authenticated attackers in SAP Business Workflow and SAP Flexible Workflow
3262 CVE-2024-13249
0.09%
26.2th 5.4 This vulnerability in Drupal's Node Access Rebuild Progressive module allows attackers to influence
3263 CVE-2025-22561
0.09%
26.5th 4.3 This CVE describes a Missing Authorization vulnerability in the WordPress Title Experiments Free plu
3264 CVE-2025-22319
0.09%
26.5th 4.3 This CVE describes a Missing Authorization vulnerability in the MashShare WordPress plugin that allo
3265 CVE-2025-22591
0.09%
26.5th 4.3 This CVE describes a missing authorization vulnerability in the Lenderd 1003 Mortgage Application Wo
3266 CVE-2025-22299
0.09%
26.5th 4.3 This CVE describes a Missing Authorization vulnerability in the spacecodes AI for SEO WordPress plug
3267 CVE-2024-13136
0.09%
26.4th 6.3 This vulnerability allows remote attackers to execute arbitrary code through insecure deserializatio
3268 CVE-2025-24947
0.09%
26.5th 5.3 A hash collision vulnerability in LSQUIC (LiteSpeed QUIC) before version 4.2.0 allows remote attacke
3269 CVE-2025-24812
0.09%
26.4th 6.5 A denial-of-service vulnerability exists in multiple SIMATIC S7-1200 PLC models where specially craf
3270 CVE-2025-22643
0.09%
26.5th 4.3 A missing authorization vulnerability in the FameThemes OnePress WordPress theme allows attackers to
3271 CVE-2025-22694
0.09%
26.5th 4.3 This CVE describes a Missing Authorization vulnerability in the Hide Shipping Method For WooCommerce
3272 CVE-2025-22681
0.09%
26.5th 4.3 This CVE describes a Missing Authorization vulnerability in the Xfinity Soft Content Cloner WordPres
3273 CVE-2025-30428
0.09%
26.4th 5.4 This vulnerability allows unauthorized viewing of photos in the Hidden Photos Album on Apple devices
3274 CVE-2025-24214
0.09%
26.5th 5.5 This CVE describes a privacy vulnerability in Apple operating systems where apps could access sensit
3275 CVE-2025-22629
0.09%
26.4th 5.3 This CVE describes a missing authorization vulnerability in the iNET Webkit WordPress plugin that al
3276 CVE-2025-25036
0.09%
26.4th 6.8 This CVE describes an XML External Entity (XXE) vulnerability in Jalios JPlatform that allows attack
3277 CVE-2024-8251
0.09%
26.2th 5.3 A Prisma injection vulnerability in mintplex-labs/anything-llm allows attackers to bypass access con
3278 CVE-2025-26138
0.09%
26.2th 6.5 Systemic Risk Value versions up to 2.8.0 have an improper access control vulnerability in the file d
3279 CVE-2025-27273
0.09%
26.4th 5.8 This vulnerability allows attackers to inject malicious scripts into web pages generated by the Affi
3280 CVE-2022-27562
0.09%
26.5th 4.6 CVE-2022-27562 is an unsafe file upload vulnerability in HCL Domino Volt that allows attackers to up
3281 CVE-2025-32364
0.09%
26.5th 4.0 A floating-point exception vulnerability in Poppler's PSStack::roll function allows attackers to cau
3282 CVE-2025-32989
0.09%
26.2th 5.3 A heap-buffer-overread vulnerability in GnuTLS allows attackers to create malicious certificates wit
3283 CVE-2025-6712
0.09%
26.5th 6.5 MongoDB Server versions 8.0 prior to 8.0.10 have a memory management vulnerability where certain int
3284 CVE-2024-40664
0.09%
26.5th 6.2 This vulnerability in Android's accessibility services allows an attacker to hide enabled accessibil
3285 CVE-2025-53057
0.09%
26.4th 5.9 This vulnerability in Oracle Java SE and GraalVM allows an unauthenticated attacker with network acc
3286 CVE-2025-11635
0.09%
26.4th 4.3 The Tomofun Furbo 360 pet camera has a file upload vulnerability that allows attackers to cause reso
3287 CVE-2025-57305
0.09%
26.5th 6.5 VitaraCharts 5.3.5 contains a Server-Side Request Forgery (SSRF) vulnerability in fileLoader.jsp tha
3288 CVE-2025-63435
0.09%
26.4th 4.3 The Xtooltech Xtool AnyScan Android application version 4.40.40 has a missing authentication vulnera
3289 CVE-2025-68387
0.09%
26.2th 6.1 This CVE describes a cross-site scripting (XSS) vulnerability in Kibana's Vega AST evaluator that al
3290 CVE-2026-25631
0.09%
26.5th 6.5 This vulnerability in n8n's HTTP Request node allows authenticated attackers to bypass credential do
3291 CVE-2026-0663
0.09%
26.4th 4.9 This vulnerability allows authenticated attackers with vault administrator privileges to crash M-Fil
3292 CVE-2026-20834
0.09%
26.5th 4.6 This CVE describes an absolute path traversal vulnerability in Windows Shell that allows an attacker
3293 CVE-2026-0514
0.09%
26.2th 6.1 This Cross-Site Scripting (XSS) vulnerability in SAP Business Connector allows unauthenticated attac
3294 CVE-2025-11723
0.09%
26.5th 6.5 This vulnerability allows unauthenticated attackers to generate valid authentication tokens for Word
3295 CVE-2026-22548
0.09%
26.4th 5.9 This vulnerability in BIG-IP Advanced WAF or ASM security policies allows attackers to cause the bd
3296 CVE-2025-23086
0.09%
26.2th 6.1 This vulnerability in Brave Browser allows malicious websites to spoof trusted site origins in file
3297 CVE-2024-13398
0.09%
26.2th 6.4 The Checkout for PayPal WordPress plugin has a stored cross-site scripting vulnerability in all vers
3298 CVE-2025-0435
0.09%
26.1th 6.5 This vulnerability allows attackers to create fake UI elements in Chrome for Android that appear leg
3299 CVE-2024-12211
0.09%
26.2th 5.4 Pega Platform versions 8.1 through Infinity 24.2.0 contain a stored cross-site scripting (XSS) vulne
3300 CVE-2025-1742
0.09%
26.2th 4.3 This vulnerability allows attackers to inject malicious scripts via the 'page_name' parameter in PiH

What is EPSS?

The Exploit Prediction Scoring System (EPSS) is a data-driven model developed by FIRST.org that estimates the probability a CVE will be exploited in the wild within the next 30 days. Unlike CVSS which measures severity, EPSS measures likelihood of exploitation — making it ideal for prioritizing which vulnerabilities to patch first.

Why EPSS matters: With thousands of CVEs published monthly, not all vulnerabilities are equally dangerous. EPSS helps security teams focus on the CVEs most likely to be actively exploited, rather than patching solely by CVSS score. A critical CVSS 9.8 vulnerability with 0.1% EPSS may be less urgent than a high CVSS 7.5 with 90% EPSS.

Prioritize by Exploit Risk

Scan your servers and see which vulnerabilities have the highest EPSS scores. Focus on what attackers are actually targeting.

Start Monitoring Free