Most Exploitable CVEs - EPSS Rankings

CVEs ranked by EPSS (Exploit Prediction Scoring System) probability. Higher scores mean a greater likelihood of exploitation in the wild within the next 30 days.

164
EPSS > 50%
156
CISA KEV Listed
35,468
CVEs with EPSS
0.7%
Avg EPSS Score
All Critical High Medium Low
Rank CVE ID EPSS Score Percentile CVSS Flags Summary
301 CVE-2025-1097
20.8%
95.5th 8.8 CVE-2025-1097 is a critical vulnerability in ingress-nginx where the auth-tls-match-cn annotation ca
302 CVE-2025-32463
20.77%
95.5th 9.3 KEV This vulnerability in Sudo allows local users to escalate privileges to root by exploiting the --chr
303 CVE-2025-56819
20.68%
95.5th 9.8 This vulnerability allows remote attackers to execute arbitrary code on Datart servers by exploiting
304 CVE-2025-64328
20.56%
95.4th 7.2 KEV FreePBX Endpoint Manager's filestore module contains a post-authentication command injection vulnera
305 CVE-2021-4462
20.47%
95.4th 9.8 CVE-2021-4462 is an unrestricted file upload vulnerability in Employee Records System version 1.0 th
306 CVE-2025-54948
20.46%
95.4th 9.4 KEV A critical vulnerability in Trend Micro Apex One (on-premise) management console allows unauthentica
307 CVE-2025-21277
20.14%
95.3th 7.5 This vulnerability in Microsoft Message Queuing (MSMQ) allows attackers to cause a denial of service
308 CVE-2024-13322
20.05%
95.3th 7.5 This SQL injection vulnerability in the Ads Pro WordPress plugin allows unauthenticated attackers to
309 CVE-2025-12490
19.7%
95.3th 8.8 This vulnerability allows authenticated remote attackers to create arbitrary files on Netgate pfSens
310 CVE-2025-24011
19.27%
95.2th 5.3 This vulnerability in Umbraco CMS allows attackers to determine whether specific user accounts exist
311 CVE-2025-55184
19.24%
95.2th 7.5 A pre-authentication denial of service vulnerability in React Server Components allows attackers to
312 CVE-2025-5287
19.24%
95.2th 7.5 This SQL injection vulnerability in the WordPress Likes and Dislikes Plugin allows unauthenticated a
313 CVE-2025-29814
18.91%
95.2th 9.3 CVE-2025-29814 is an improper authorization vulnerability in Microsoft Partner Center that allows au
314 CVE-2025-20333
18.66%
95.1th 9.9 KEV This critical vulnerability in Cisco ASA and FTD VPN web servers allows authenticated remote attacke
315 CVE-2024-11635
18.6%
95.1th 9.8 This vulnerability allows unauthenticated attackers to execute arbitrary code on WordPress servers r
316 CVE-2025-34045
18.59%
95.1th 7.5 A path traversal vulnerability in WeiPHP 5.0 allows unauthenticated remote attackers to read arbitra
317 CVE-2026-22200
18.47%
95.1th 7.5 This vulnerability allows remote attackers to read arbitrary files from the osTicket server filesyst
318 CVE-2025-55727
18.34%
95.1th 10.0 CVE-2025-55727 is a critical remote code execution vulnerability in XWiki Remote Macros that allows
319 CVE-2024-13488
18.19%
95th 7.5 This SQL injection vulnerability in the LTL Freight Quotes – Estes Edition WordPress plugin allows
320 CVE-2024-53615
17.96%
95th 6.5 This CVE describes a command injection vulnerability in Karl Ward's files.gallery video thumbnail re
321 CVE-2023-47179
17.82%
95th 8.8 CVE-2023-47179 is a missing authorization vulnerability in ByConsole WooODT Lite WordPress plugin th
322 CVE-2024-51818
17.69%
94.9th 9.3 This SQL injection vulnerability in the Fancy Product Designer WordPress plugin allows attackers to
323 CVE-2025-25038
17.59%
94.9th 9.8 A critical OS command injection vulnerability in MiniDVBLinux allows remote unauthenticated attacker
324 CVE-2025-25579
17.55%
94.9th 9.8 This vulnerability allows remote attackers to execute arbitrary commands on TOTOLINK A3002R routers
325 CVE-2025-28146
17.55%
94.9th 9.8 This CVE describes a critical command injection vulnerability in Edimax AC1200 routers that allows a
326 CVE-2024-7014
17.55%
94.9th 8.1 The EvilVideo vulnerability in Telegram for Android allows attackers to send malicious applications
327 CVE-2025-25163
17.53%
94.9th 7.5 This path traversal vulnerability in the WordPress Plugin A/B Image Optimizer allows attackers to do
328 CVE-2025-6934
17.48%
94.9th 9.8 This vulnerability allows unauthenticated attackers to register accounts with Administrator privileg
329 CVE-2024-12535
17.43%
94.9th 8.6 The Host PHP Info WordPress plugin allows unauthenticated attackers to access sensitive server confi
330 CVE-2024-31903
17.08%
94.8th 8.8 This vulnerability allows attackers on the local network to execute arbitrary code on IBM Sterling B
331 CVE-2025-45854
16.79%
94.8th 10.0 CVE-2025-45854 is a critical remote code execution vulnerability in JEHC-BPM 2.0.1 that allows attac
332 CVE-2025-36604
16.77%
94.8th 7.3 This CVE describes an OS command injection vulnerability in Dell Unity storage systems. Unauthentica
333 CVE-2025-5701
16.6%
94.8th 9.8 The HyperComments WordPress plugin has a critical vulnerability that allows unauthenticated attacker
334 CVE-2025-4380
16.51%
94.7th 8.1 This vulnerability allows unauthenticated attackers to include and execute arbitrary PHP files on Wo
335 CVE-2025-22939
16.44%
94.7th 9.8 A command injection vulnerability in the telnet service of Adtran 411 ONT devices allows unauthentic
336 CVE-2025-6771
16.44%
94.7th 7.2 This vulnerability allows authenticated attackers with high privileges in Ivanti Endpoint Manager Mo
337 CVE-2025-2476
16.42%
94.7th 8.8 This critical vulnerability in Google Chrome's Lens feature allows remote attackers to execute arbit
338 CVE-2025-8085
16.34%
94.7th 8.6 The Ditty WordPress plugin before version 3.1.58 has an authentication bypass vulnerability in its d
339 CVE-2025-1562
16.07%
94.6th 9.8 This vulnerability allows unauthenticated attackers to install arbitrary WordPress plugins on sites
340 CVE-2025-29471
15.96%
94.6th 8.3 A Cross-Site Scripting (XSS) vulnerability in Nagios Log Server v.2024R1.3.1 allows remote attackers
341 CVE-2025-2777
15.81%
94.6th 9.3 SysAid On-Prem versions up to 23.3.40 contain an unauthenticated XML External Entity (XXE) vulnerabi
342 CVE-2024-10811
15.64%
94.5th 9.8 This vulnerability allows remote unauthenticated attackers to perform absolute path traversal attack
343 CVE-2025-6804
15.61%
94.5th 7.5 This vulnerability allows unauthenticated remote attackers to perform directory traversal attacks on
344 CVE-2025-6800
15.61%
94.5th 7.5 This vulnerability allows unauthenticated remote attackers to read arbitrary files on systems runnin
345 CVE-2025-6797
15.61%
94.5th 7.5 This vulnerability allows unauthenticated remote attackers to read arbitrary files on Marvell QConve
346 CVE-2025-48954
15.58%
94.5th 8.1 Discourse versions before 3.5.0.beta6 are vulnerable to cross-site scripting (XSS) when social login
347 CVE-2025-63387
15.48%
94.5th 7.5 CVE-2025-63387 is an insecure permissions vulnerability in Dify v1.9.1 that allows unauthenticated a
348 CVE-2025-21276
15.44%
94.5th 7.5 This vulnerability in Windows MapUrlToZone function allows attackers to cause denial of service by c
349 CVE-2025-30154
15.4%
94.5th 8.6 KEV CVE-2025-30154 is a supply chain attack where the reviewdog/action-setup GitHub Action was compromis
350 CVE-2025-22710
15.38%
94.5th 7.6 This SQL injection vulnerability in the StoreApps Smart Manager WordPress plugin allows attackers to

What is EPSS?

The Exploit Prediction Scoring System (EPSS) is a data-driven model developed by FIRST.org that estimates the probability a CVE will be exploited in the wild within the next 30 days. Unlike CVSS which measures severity, EPSS measures likelihood of exploitation — making it ideal for prioritizing which vulnerabilities to patch first.

Why EPSS matters: With thousands of CVEs published monthly, not all vulnerabilities are equally dangerous. EPSS helps security teams focus on the CVEs most likely to be actively exploited, rather than patching solely by CVSS score. A critical CVSS 9.8 vulnerability with 0.1% EPSS may be less urgent than a high CVSS 7.5 with 90% EPSS.

Prioritize by Exploit Risk

Scan your servers and see which vulnerabilities have the highest EPSS scores. Focus on what attackers are actually targeting.

Start Monitoring Free