Most Exploitable CVEs - EPSS Rankings
CVEs ranked by EPSS (Exploit Prediction Scoring System) probability. Higher scores mean a greater likelihood of exploitation in the wild within the next 30 days.
| Rank | CVE ID | EPSS Score | Percentile | CVSS | Flags | Summary |
|---|---|---|---|---|---|---|
| 3251 | CVE-2025-24744 |
|
26.5th | 4.3 | CVE-2025-24744 is a missing authorization vulnerability in the Bridge Core WordPress plugin that all | |
| 3252 | CVE-2025-24754 |
|
26.5th | 4.3 | This CVE describes a missing authorization vulnerability in the Houzez WordPress theme that allows u | |
| 3253 | CVE-2025-24693 |
|
26.5th | 4.3 | This CVE describes a missing authorization vulnerability in the Yehi Advanced Notifications WordPres | |
| 3254 | CVE-2025-23962 |
|
26.5th | 4.3 | This CVE describes a Missing Authorization vulnerability in the Goldstar WordPress plugin that allow | |
| 3255 | CVE-2025-23957 |
|
26.5th | 4.3 | This CVE describes a Missing Authorization vulnerability in the Sur.ly WordPress plugin that allows | |
| 3256 | CVE-2025-23954 |
|
26.5th | 4.3 | This CVE describes a missing authorization vulnerability in the Salvador AI Image Generator WordPres | |
| 3257 | CVE-2025-23929 |
|
26.5th | 4.3 | This CVE describes a Missing Authorization vulnerability in the wishfulthemes Email Capture & Lead G | |
| 3258 | CVE-2025-23423 |
|
26.5th | 4.3 | This CVE describes a Missing Authorization vulnerability in the SendGrid for WordPress plugin that a | |
| 3259 | CVE-2025-0480 |
|
26.5th | 4.3 | This CVE-2025-0480 vulnerability in wuzhicms 4.1.0 allows attackers to perform server-side request f | |
| 3260 | CVE-2025-22779 |
|
26.5th | 4.3 | This CVE describes a Missing Authorization vulnerability in the WP News Sliders WordPress plugin tha | |
| 3261 | CVE-2025-0058 |
|
26.4th | 6.5 | This vulnerability allows authenticated attackers in SAP Business Workflow and SAP Flexible Workflow | |
| 3262 | CVE-2024-13249 |
|
26.2th | 5.4 | This vulnerability in Drupal's Node Access Rebuild Progressive module allows attackers to influence | |
| 3263 | CVE-2025-22561 |
|
26.5th | 4.3 | This CVE describes a Missing Authorization vulnerability in the WordPress Title Experiments Free plu | |
| 3264 | CVE-2025-22319 |
|
26.5th | 4.3 | This CVE describes a Missing Authorization vulnerability in the MashShare WordPress plugin that allo | |
| 3265 | CVE-2025-22591 |
|
26.5th | 4.3 | This CVE describes a missing authorization vulnerability in the Lenderd 1003 Mortgage Application Wo | |
| 3266 | CVE-2025-22299 |
|
26.5th | 4.3 | This CVE describes a Missing Authorization vulnerability in the spacecodes AI for SEO WordPress plug | |
| 3267 | CVE-2024-13136 |
|
26.4th | 6.3 | This vulnerability allows remote attackers to execute arbitrary code through insecure deserializatio | |
| 3268 | CVE-2025-24947 |
|
26.5th | 5.3 | A hash collision vulnerability in LSQUIC (LiteSpeed QUIC) before version 4.2.0 allows remote attacke | |
| 3269 | CVE-2025-24812 |
|
26.4th | 6.5 | A denial-of-service vulnerability exists in multiple SIMATIC S7-1200 PLC models where specially craf | |
| 3270 | CVE-2025-22643 |
|
26.5th | 4.3 | A missing authorization vulnerability in the FameThemes OnePress WordPress theme allows attackers to | |
| 3271 | CVE-2025-22694 |
|
26.5th | 4.3 | This CVE describes a Missing Authorization vulnerability in the Hide Shipping Method For WooCommerce | |
| 3272 | CVE-2025-22681 |
|
26.5th | 4.3 | This CVE describes a Missing Authorization vulnerability in the Xfinity Soft Content Cloner WordPres | |
| 3273 | CVE-2025-30428 |
|
26.4th | 5.4 | This vulnerability allows unauthorized viewing of photos in the Hidden Photos Album on Apple devices | |
| 3274 | CVE-2025-24214 |
|
26.5th | 5.5 | This CVE describes a privacy vulnerability in Apple operating systems where apps could access sensit | |
| 3275 | CVE-2025-22629 |
|
26.4th | 5.3 | This CVE describes a missing authorization vulnerability in the iNET Webkit WordPress plugin that al | |
| 3276 | CVE-2025-25036 |
|
26.4th | 6.8 | This CVE describes an XML External Entity (XXE) vulnerability in Jalios JPlatform that allows attack | |
| 3277 | CVE-2024-8251 |
|
26.2th | 5.3 | A Prisma injection vulnerability in mintplex-labs/anything-llm allows attackers to bypass access con | |
| 3278 | CVE-2025-26138 |
|
26.2th | 6.5 | Systemic Risk Value versions up to 2.8.0 have an improper access control vulnerability in the file d | |
| 3279 | CVE-2025-27273 |
|
26.4th | 5.8 | This vulnerability allows attackers to inject malicious scripts into web pages generated by the Affi | |
| 3280 | CVE-2022-27562 |
|
26.5th | 4.6 | CVE-2022-27562 is an unsafe file upload vulnerability in HCL Domino Volt that allows attackers to up | |
| 3281 | CVE-2025-32364 |
|
26.5th | 4.0 | A floating-point exception vulnerability in Poppler's PSStack::roll function allows attackers to cau | |
| 3282 | CVE-2025-32989 |
|
26.2th | 5.3 | A heap-buffer-overread vulnerability in GnuTLS allows attackers to create malicious certificates wit | |
| 3283 | CVE-2025-6712 |
|
26.5th | 6.5 | MongoDB Server versions 8.0 prior to 8.0.10 have a memory management vulnerability where certain int | |
| 3284 | CVE-2024-40664 |
|
26.5th | 6.2 | This vulnerability in Android's accessibility services allows an attacker to hide enabled accessibil | |
| 3285 | CVE-2025-53057 |
|
26.4th | 5.9 | This vulnerability in Oracle Java SE and GraalVM allows an unauthenticated attacker with network acc | |
| 3286 | CVE-2025-11635 |
|
26.4th | 4.3 | The Tomofun Furbo 360 pet camera has a file upload vulnerability that allows attackers to cause reso | |
| 3287 | CVE-2025-57305 |
|
26.5th | 6.5 | VitaraCharts 5.3.5 contains a Server-Side Request Forgery (SSRF) vulnerability in fileLoader.jsp tha | |
| 3288 | CVE-2025-63435 |
|
26.4th | 4.3 | The Xtooltech Xtool AnyScan Android application version 4.40.40 has a missing authentication vulnera | |
| 3289 | CVE-2025-68387 |
|
26.2th | 6.1 | This CVE describes a cross-site scripting (XSS) vulnerability in Kibana's Vega AST evaluator that al | |
| 3290 | CVE-2026-25631 |
|
26.5th | 6.5 | This vulnerability in n8n's HTTP Request node allows authenticated attackers to bypass credential do | |
| 3291 | CVE-2026-0663 |
|
26.4th | 4.9 | This vulnerability allows authenticated attackers with vault administrator privileges to crash M-Fil | |
| 3292 | CVE-2026-20834 |
|
26.5th | 4.6 | This CVE describes an absolute path traversal vulnerability in Windows Shell that allows an attacker | |
| 3293 | CVE-2026-0514 |
|
26.2th | 6.1 | This Cross-Site Scripting (XSS) vulnerability in SAP Business Connector allows unauthenticated attac | |
| 3294 | CVE-2025-11723 |
|
26.5th | 6.5 | This vulnerability allows unauthenticated attackers to generate valid authentication tokens for Word | |
| 3295 | CVE-2026-22548 |
|
26.4th | 5.9 | This vulnerability in BIG-IP Advanced WAF or ASM security policies allows attackers to cause the bd | |
| 3296 | CVE-2025-23086 |
|
26.2th | 6.1 | This vulnerability in Brave Browser allows malicious websites to spoof trusted site origins in file | |
| 3297 | CVE-2024-13398 |
|
26.2th | 6.4 | The Checkout for PayPal WordPress plugin has a stored cross-site scripting vulnerability in all vers | |
| 3298 | CVE-2025-0435 |
|
26.1th | 6.5 | This vulnerability allows attackers to create fake UI elements in Chrome for Android that appear leg | |
| 3299 | CVE-2024-12211 |
|
26.2th | 5.4 | Pega Platform versions 8.1 through Infinity 24.2.0 contain a stored cross-site scripting (XSS) vulne | |
| 3300 | CVE-2025-1742 |
|
26.2th | 4.3 | This vulnerability allows attackers to inject malicious scripts via the 'page_name' parameter in PiH |
What is EPSS?
The Exploit Prediction Scoring System (EPSS) is a data-driven model developed by FIRST.org that estimates the probability a CVE will be exploited in the wild within the next 30 days. Unlike CVSS which measures severity, EPSS measures likelihood of exploitation — making it ideal for prioritizing which vulnerabilities to patch first.
Why EPSS matters: With thousands of CVEs published monthly, not all vulnerabilities are equally dangerous. EPSS helps security teams focus on the CVEs most likely to be actively exploited, rather than patching solely by CVSS score. A critical CVSS 9.8 vulnerability with 0.1% EPSS may be less urgent than a high CVSS 7.5 with 90% EPSS.
Prioritize by Exploit Risk
Scan your servers and see which vulnerabilities have the highest EPSS scores. Focus on what attackers are actually targeting.
Start Monitoring Free