Most Exploitable CVEs - EPSS Rankings
CVEs ranked by EPSS (Exploit Prediction Scoring System) probability. Higher scores mean a greater likelihood of exploitation in the wild within the next 30 days.
| Rank | CVE ID | EPSS Score | Percentile | CVSS | Flags | Summary |
|---|---|---|---|---|---|---|
| 3301 | CVE-2024-13113 |
|
26.1th | 5.9 | This vulnerability allows users with contributor-level access or higher in WordPress to inject malic | |
| 3302 | CVE-2023-51303 |
|
26.2th | 6.1 | PHPJabbers Event Ticketing System v1.0 contains multiple HTML injection vulnerabilities in several p | |
| 3303 | CVE-2024-47265 |
|
26.1th | 6.5 | This CVE describes a path traversal vulnerability in Synology Active Backup for Business that allows | |
| 3304 | CVE-2024-6097 |
|
26.1th | 5.3 | This vulnerability allows a local threat actor to disclose sensitive information through absolute pa | |
| 3305 | CVE-2025-2638 |
|
26.1th | 4.3 | This vulnerability in JIZHICMS allows improper authorization through manipulation of the 'ishot' par | |
| 3306 | CVE-2024-13838 |
|
26.2th | 5.5 | This vulnerability allows authenticated WordPress administrators to perform Server-Side Request Forg | |
| 3307 | CVE-2025-26706 |
|
26.1th | 5.4 | An improper privilege management vulnerability in ZTE GoldenDB allows authenticated users to escalat | |
| 3308 | CVE-2024-51099 |
|
26.1th | 6.1 | This CVE describes a reflected cross-site scripting (XSS) vulnerability in PHPGURUKUL Medical Card G | |
| 3309 | CVE-2025-4258 |
|
26.1th | 6.3 | This critical vulnerability in Youkefu allows remote attackers to upload arbitrary files without res | |
| 3310 | CVE-2025-1735 |
|
26.2th | 5.9 | This vulnerability in PHP's PostgreSQL extensions (pgsql and pdo_pgsql) fails to properly handle err | |
| 3311 | CVE-2025-53636 |
|
26.2th | 5.4 | Open OnDemand users can flood system logs by generating repeated errors through the shell app, creat | |
| 3312 | CVE-2025-57254 |
|
26.2th | 6.5 | This SQL injection vulnerability in Karthikg1908 Hospital Management System 1.0 allows attackers to | |
| 3313 | CVE-2025-10050 |
|
26.1th | 6.6 | This vulnerability in the Developer Loggers for Simple History WordPress plugin allows authenticated | |
| 3314 | CVE-2025-10322 |
|
26.1th | 5.3 | This vulnerability in Wavlink WL-WN578W2 routers allows attackers to remotely exploit weak password | |
| 3315 | CVE-2024-45669 |
|
26.2th | 6.5 | This vulnerability in IBM Security Verify Information Queue allows remote attackers to cause denial | |
| 3316 | CVE-2025-61152 |
|
26.1th | 6.5 | CVE-2025-61152 is a JWT authentication bypass vulnerability in python-jose that allows attackers to | |
| 3317 | CVE-2025-11337 |
|
26.2th | 5.3 | This CVE describes a path traversal vulnerability in Four-Faith Water Conservancy Informatization Pl | |
| 3318 | CVE-2025-11336 |
|
26.2th | 5.3 | This CVE describes a path traversal vulnerability in Four-Faith Water Conservancy Informatization Pl | |
| 3319 | CVE-2025-60447 |
|
26.1th | 5.9 | A stored XSS vulnerability in Emlog Pro 2.5.19 allows administrators to inject malicious HTML/JavaSc | |
| 3320 | CVE-2025-63785 |
|
26.1th | 6.1 | A DOM-based XSS vulnerability in Onlook web application 0.2.32 allows attackers to inject malicious | |
| 3321 | CVE-2025-12883 |
|
26.2th | 5.3 | The Campay Woocommerce Payment Gateway plugin for WordPress has a vulnerability that allows unauthen | |
| 3322 | CVE-2025-65899 |
|
26.1th | 5.3 | CVE-2025-65899 is a user enumeration vulnerability in Kalmia CMS that allows unauthenticated attacke | |
| 3323 | CVE-2026-22992 |
|
26.2th | 5.5 | A Linux kernel vulnerability in the libceph component where authentication errors aren't properly pr | |
| 3324 | CVE-2025-65397 |
|
26.1th | 6.8 | This vulnerability allows attackers with physical access to Blurams Flare Camera devices to execute | |
| 3325 | CVE-2024-57326 |
|
25.9th | 6.1 | A reflected XSS vulnerability in Online Pizza Delivery System 1.0 allows attackers to inject malicio | |
| 3326 | CVE-2024-12071 |
|
26th | 5.3 | This vulnerability in the Evergreen Content Poster WordPress plugin allows unauthenticated attackers | |
| 3327 | CVE-2024-48460 |
|
26th | 4.3 | A vulnerability in Eugeny Tabby terminal emulator version 1.0.213 allows remote attackers to capture | |
| 3328 | CVE-2024-8002 |
|
26th | 4.3 | This vulnerability in VIWIS LMS allows attackers to inject malicious scripts through manipulated fil | |
| 3329 | CVE-2024-13678 |
|
25.9th | 6.1 | The R3W InstaFeed WordPress plugin through version 1.0 contains a reflected cross-site scripting (XS | |
| 3330 | CVE-2025-27089 |
|
25.9th | 5.4 | This vulnerability in Directus allows users with overlapping update permissions to modify fields the | |
| 3331 | CVE-2024-12586 |
|
25.9th | 6.1 | The Chalet-Montagne.com Tools WordPress plugin through version 2.7.8 contains a reflected cross-site | |
| 3332 | CVE-2025-24805 |
|
25.9th | 5.5 | CVE-2025-24805 is an improper privilege management vulnerability in Mobile Security Framework (MobSF | |
| 3333 | CVE-2025-0191 |
|
26th | 6.5 | A Denial of Service vulnerability in gaizhenbiao/chuanhuchatgpt allows attackers to crash the servic | |
| 3334 | CVE-2024-7039 |
|
26th | 6.7 | This vulnerability allows an authenticated admin user to delete other administrators through direct | |
| 3335 | CVE-2024-10707 |
|
25.9th | 6.5 | This vulnerability allows unauthenticated attackers to read arbitrary files on servers running vulne | |
| 3336 | CVE-2025-23382 |
|
25.9th | 5.5 | Dell Secure Connect Gateway (SCG) 5.0 Appliance versions 5.26 expose sensitive system information to | |
| 3337 | CVE-2025-20922 |
|
26th | 5.5 | An out-of-bounds read vulnerability in Samsung Notes allows attackers to read memory beyond intended | |
| 3338 | CVE-2025-20920 |
|
26th | 5.5 | An out-of-bounds read vulnerability in Samsung Notes' action link data handling allows attackers to | |
| 3339 | CVE-2025-20918 |
|
26th | 5.5 | An out-of-bounds read vulnerability in Samsung Notes allows attackers to read memory beyond allocate | |
| 3340 | CVE-2025-20916 |
|
26th | 5.5 | An out-of-bounds read vulnerability in Samsung Notes' SPen string reading functionality allows attac | |
| 3341 | CVE-2025-20914 |
|
26th | 5.5 | An out-of-bounds read vulnerability in Samsung Notes' handwriting content processing allows attacker | |
| 3342 | CVE-2025-27425 |
|
26th | 4.3 | This vulnerability in Firefox for iOS allows QR codes containing website URLs to open those URLs aut | |
| 3343 | CVE-2025-23132 |
|
25.9th | 5.5 | This CVE describes a race condition vulnerability in the Linux kernel's F2FS filesystem quota handli | |
| 3344 | CVE-2025-22114 |
|
25.9th | 5.5 | A logic error in the Linux kernel's Btrfs filesystem validation function could allow mounting of inv | |
| 3345 | CVE-2025-3364 |
|
26th | 6.7 | This CVE describes a chroot escape vulnerability in HGiga PowerStation's SSH service. Attackers with | |
| 3346 | CVE-2025-29482 |
|
25.9th | 6.2 | A buffer overflow vulnerability in libheif 1.19.7 allows local attackers to execute arbitrary code t | |
| 3347 | CVE-2025-21949 |
|
25.9th | 5.5 | A memory alignment vulnerability in the Linux kernel's LoongArch architecture hugetlbfs implementati | |
| 3348 | CVE-2025-44895 |
|
25.9th | 6.5 | This CVE describes a stack overflow vulnerability in the FW-WGS-804HPT router's web interface. Attac | |
| 3349 | CVE-2025-48174 |
|
25.9th | 4.5 | This vulnerability in libavif (AV1 Image File Format library) involves an integer overflow in the ma | |
| 3350 | CVE-2025-45867 |
|
25.9th | 5.4 | This CVE describes a buffer overflow vulnerability in TOTOLINK A3002R routers via the static_dns1 pa |
What is EPSS?
The Exploit Prediction Scoring System (EPSS) is a data-driven model developed by FIRST.org that estimates the probability a CVE will be exploited in the wild within the next 30 days. Unlike CVSS which measures severity, EPSS measures likelihood of exploitation — making it ideal for prioritizing which vulnerabilities to patch first.
Why EPSS matters: With thousands of CVEs published monthly, not all vulnerabilities are equally dangerous. EPSS helps security teams focus on the CVEs most likely to be actively exploited, rather than patching solely by CVSS score. A critical CVSS 9.8 vulnerability with 0.1% EPSS may be less urgent than a high CVSS 7.5 with 90% EPSS.
Prioritize by Exploit Risk
Scan your servers and see which vulnerabilities have the highest EPSS scores. Focus on what attackers are actually targeting.
Start Monitoring Free