Most Exploitable CVEs - EPSS Rankings

CVEs ranked by EPSS (Exploit Prediction Scoring System) probability. Higher scores mean a greater likelihood of exploitation in the wild within the next 30 days.

164
EPSS > 50%
156
CISA KEV Listed
35,468
CVEs with EPSS
0.7%
Avg EPSS Score
All Critical High Medium Low
Rank CVE ID EPSS Score Percentile CVSS Flags Summary
3301 CVE-2024-13113
0.09%
26.1th 5.9 This vulnerability allows users with contributor-level access or higher in WordPress to inject malic
3302 CVE-2023-51303
0.09%
26.2th 6.1 PHPJabbers Event Ticketing System v1.0 contains multiple HTML injection vulnerabilities in several p
3303 CVE-2024-47265
0.09%
26.1th 6.5 This CVE describes a path traversal vulnerability in Synology Active Backup for Business that allows
3304 CVE-2024-6097
0.09%
26.1th 5.3 This vulnerability allows a local threat actor to disclose sensitive information through absolute pa
3305 CVE-2025-2638
0.09%
26.1th 4.3 This vulnerability in JIZHICMS allows improper authorization through manipulation of the 'ishot' par
3306 CVE-2024-13838
0.09%
26.2th 5.5 This vulnerability allows authenticated WordPress administrators to perform Server-Side Request Forg
3307 CVE-2025-26706
0.09%
26.1th 5.4 An improper privilege management vulnerability in ZTE GoldenDB allows authenticated users to escalat
3308 CVE-2024-51099
0.09%
26.1th 6.1 This CVE describes a reflected cross-site scripting (XSS) vulnerability in PHPGURUKUL Medical Card G
3309 CVE-2025-4258
0.09%
26.1th 6.3 This critical vulnerability in Youkefu allows remote attackers to upload arbitrary files without res
3310 CVE-2025-1735
0.09%
26.2th 5.9 This vulnerability in PHP's PostgreSQL extensions (pgsql and pdo_pgsql) fails to properly handle err
3311 CVE-2025-53636
0.09%
26.2th 5.4 Open OnDemand users can flood system logs by generating repeated errors through the shell app, creat
3312 CVE-2025-57254
0.09%
26.2th 6.5 This SQL injection vulnerability in Karthikg1908 Hospital Management System 1.0 allows attackers to
3313 CVE-2025-10050
0.09%
26.1th 6.6 This vulnerability in the Developer Loggers for Simple History WordPress plugin allows authenticated
3314 CVE-2025-10322
0.09%
26.1th 5.3 This vulnerability in Wavlink WL-WN578W2 routers allows attackers to remotely exploit weak password
3315 CVE-2024-45669
0.09%
26.2th 6.5 This vulnerability in IBM Security Verify Information Queue allows remote attackers to cause denial
3316 CVE-2025-61152
0.09%
26.1th 6.5 CVE-2025-61152 is a JWT authentication bypass vulnerability in python-jose that allows attackers to
3317 CVE-2025-11337
0.09%
26.2th 5.3 This CVE describes a path traversal vulnerability in Four-Faith Water Conservancy Informatization Pl
3318 CVE-2025-11336
0.09%
26.2th 5.3 This CVE describes a path traversal vulnerability in Four-Faith Water Conservancy Informatization Pl
3319 CVE-2025-60447
0.09%
26.1th 5.9 A stored XSS vulnerability in Emlog Pro 2.5.19 allows administrators to inject malicious HTML/JavaSc
3320 CVE-2025-63785
0.09%
26.1th 6.1 A DOM-based XSS vulnerability in Onlook web application 0.2.32 allows attackers to inject malicious
3321 CVE-2025-12883
0.09%
26.2th 5.3 The Campay Woocommerce Payment Gateway plugin for WordPress has a vulnerability that allows unauthen
3322 CVE-2025-65899
0.09%
26.1th 5.3 CVE-2025-65899 is a user enumeration vulnerability in Kalmia CMS that allows unauthenticated attacke
3323 CVE-2026-22992
0.09%
26.2th 5.5 A Linux kernel vulnerability in the libceph component where authentication errors aren't properly pr
3324 CVE-2025-65397
0.09%
26.1th 6.8 This vulnerability allows attackers with physical access to Blurams Flare Camera devices to execute
3325 CVE-2024-57326
0.09%
25.9th 6.1 A reflected XSS vulnerability in Online Pizza Delivery System 1.0 allows attackers to inject malicio
3326 CVE-2024-12071
0.09%
26th 5.3 This vulnerability in the Evergreen Content Poster WordPress plugin allows unauthenticated attackers
3327 CVE-2024-48460
0.09%
26th 4.3 A vulnerability in Eugeny Tabby terminal emulator version 1.0.213 allows remote attackers to capture
3328 CVE-2024-8002
0.09%
26th 4.3 This vulnerability in VIWIS LMS allows attackers to inject malicious scripts through manipulated fil
3329 CVE-2024-13678
0.09%
25.9th 6.1 The R3W InstaFeed WordPress plugin through version 1.0 contains a reflected cross-site scripting (XS
3330 CVE-2025-27089
0.09%
25.9th 5.4 This vulnerability in Directus allows users with overlapping update permissions to modify fields the
3331 CVE-2024-12586
0.09%
25.9th 6.1 The Chalet-Montagne.com Tools WordPress plugin through version 2.7.8 contains a reflected cross-site
3332 CVE-2025-24805
0.09%
25.9th 5.5 CVE-2025-24805 is an improper privilege management vulnerability in Mobile Security Framework (MobSF
3333 CVE-2025-0191
0.09%
26th 6.5 A Denial of Service vulnerability in gaizhenbiao/chuanhuchatgpt allows attackers to crash the servic
3334 CVE-2024-7039
0.09%
26th 6.7 This vulnerability allows an authenticated admin user to delete other administrators through direct
3335 CVE-2024-10707
0.09%
25.9th 6.5 This vulnerability allows unauthenticated attackers to read arbitrary files on servers running vulne
3336 CVE-2025-23382
0.09%
25.9th 5.5 Dell Secure Connect Gateway (SCG) 5.0 Appliance versions 5.26 expose sensitive system information to
3337 CVE-2025-20922
0.09%
26th 5.5 An out-of-bounds read vulnerability in Samsung Notes allows attackers to read memory beyond intended
3338 CVE-2025-20920
0.09%
26th 5.5 An out-of-bounds read vulnerability in Samsung Notes' action link data handling allows attackers to
3339 CVE-2025-20918
0.09%
26th 5.5 An out-of-bounds read vulnerability in Samsung Notes allows attackers to read memory beyond allocate
3340 CVE-2025-20916
0.09%
26th 5.5 An out-of-bounds read vulnerability in Samsung Notes' SPen string reading functionality allows attac
3341 CVE-2025-20914
0.09%
26th 5.5 An out-of-bounds read vulnerability in Samsung Notes' handwriting content processing allows attacker
3342 CVE-2025-27425
0.09%
26th 4.3 This vulnerability in Firefox for iOS allows QR codes containing website URLs to open those URLs aut
3343 CVE-2025-23132
0.09%
25.9th 5.5 This CVE describes a race condition vulnerability in the Linux kernel's F2FS filesystem quota handli
3344 CVE-2025-22114
0.09%
25.9th 5.5 A logic error in the Linux kernel's Btrfs filesystem validation function could allow mounting of inv
3345 CVE-2025-3364
0.09%
26th 6.7 This CVE describes a chroot escape vulnerability in HGiga PowerStation's SSH service. Attackers with
3346 CVE-2025-29482
0.09%
25.9th 6.2 A buffer overflow vulnerability in libheif 1.19.7 allows local attackers to execute arbitrary code t
3347 CVE-2025-21949
0.09%
25.9th 5.5 A memory alignment vulnerability in the Linux kernel's LoongArch architecture hugetlbfs implementati
3348 CVE-2025-44895
0.09%
25.9th 6.5 This CVE describes a stack overflow vulnerability in the FW-WGS-804HPT router's web interface. Attac
3349 CVE-2025-48174
0.09%
25.9th 4.5 This vulnerability in libavif (AV1 Image File Format library) involves an integer overflow in the ma
3350 CVE-2025-45867
0.09%
25.9th 5.4 This CVE describes a buffer overflow vulnerability in TOTOLINK A3002R routers via the static_dns1 pa

What is EPSS?

The Exploit Prediction Scoring System (EPSS) is a data-driven model developed by FIRST.org that estimates the probability a CVE will be exploited in the wild within the next 30 days. Unlike CVSS which measures severity, EPSS measures likelihood of exploitation — making it ideal for prioritizing which vulnerabilities to patch first.

Why EPSS matters: With thousands of CVEs published monthly, not all vulnerabilities are equally dangerous. EPSS helps security teams focus on the CVEs most likely to be actively exploited, rather than patching solely by CVSS score. A critical CVSS 9.8 vulnerability with 0.1% EPSS may be less urgent than a high CVSS 7.5 with 90% EPSS.

Prioritize by Exploit Risk

Scan your servers and see which vulnerabilities have the highest EPSS scores. Focus on what attackers are actually targeting.

Start Monitoring Free