Most Exploitable CVEs - EPSS Rankings

CVEs ranked by EPSS (Exploit Prediction Scoring System) probability. Higher scores mean a greater likelihood of exploitation in the wild within the next 30 days.

164
EPSS > 50%
156
CISA KEV Listed
35,468
CVEs with EPSS
0.7%
Avg EPSS Score
All Critical High Medium Low
Rank CVE ID EPSS Score Percentile CVSS Flags Summary
301 CVE-2025-22352
2.94%
86.1th 7.6 This SQL injection vulnerability in the ELEX WooCommerce Advanced Bulk Edit plugin allows attackers
302 CVE-2024-11170
2.88%
86th 8.8 A path traversal vulnerability in danny-avila/librechat allows attackers to write files to arbitrary
303 CVE-2025-2328
2.88%
86th 8.8 This vulnerability allows unauthenticated attackers to delete arbitrary files on WordPress servers u
304 CVE-2024-48245
2.85%
85.9th 7.2 Vehicle Management System 1.0 contains SQL injection vulnerabilities in POST parameters that allow g
305 CVE-2025-4255
2.8%
85.8th 7.3 A critical buffer overflow vulnerability in PCMan FTP Server 2.0.7 allows remote attackers to execut
306 CVE-2025-21396
2.79%
85.8th 8.2 This vulnerability allows unauthorized attackers to elevate privileges in Microsoft Account systems
307 CVE-2025-66516
2.73%
85.6th 8.4 This critical XXE vulnerability in Apache Tika allows attackers to perform XML External Entity injec
308 CVE-2025-47161
2.72%
85.6th 7.8 CVE-2025-47161 is an improper access control vulnerability in Microsoft Defender for Endpoint that a
309 CVE-2025-25293
2.7%
85.6th 7.5 This vulnerability in ruby-saml allows remote attackers to cause Denial of Service (DoS) by sending
310 CVE-2024-13359
2.7%
85.6th 8.1 The Product Input Fields for WooCommerce WordPress plugin has an arbitrary file upload vulnerability
311 CVE-2025-47917
2.7%
85.5th 8.9 Mbed TLS versions before 3.6.4 contain a use-after-free vulnerability in the mbedtls_x509_string_to_
312 CVE-2025-55763
2.69%
85.5th 7.5 A buffer overflow vulnerability in CivetWeb's URI parser allows remote attackers to execute arbitrar
313 CVE-2025-54769
2.68%
85.5th 8.8 This vulnerability allows authenticated read-only users to upload files and perform directory traver
314 CVE-2024-11609
2.62%
85.3th 7.8 A stack-based buffer overflow vulnerability in AutomationDirect C-More EA9 programming software allo
315 CVE-2024-12390
2.6%
85.3th 8.8 This vulnerability allows remote attackers to execute arbitrary code on systems running vulnerable v
316 CVE-2024-12389
2.6%
85.3th 8.8 A path traversal vulnerability in binary-husky/gpt_academic allows attackers to write arbitrary file
317 CVE-2025-3002
2.59%
85.3th 7.3 This critical vulnerability in Digital China DCME-520 devices allows remote attackers to execute arb
318 CVE-2025-54366
2.54%
85.1th 8.8 CVE-2025-54366 is a critical deserialization vulnerability in FreeScout help desk software that allo
319 CVE-2025-52089
2.53%
85.1th 8.8 This vulnerability allows authenticated attackers to execute arbitrary operating system commands wit
320 CVE-2025-0624
2.49%
85th 7.6 This CVE-2025-0624 vulnerability in grub2 allows remote attackers on the same network segment to exe
321 CVE-2025-55141
2.48%
85th 8.8 This CVE describes a missing authorization vulnerability in Ivanti security products that allows aut
322 CVE-2026-21514
2.47%
85th 7.8 KEV This vulnerability in Microsoft Office Word allows attackers to bypass local security features by ma
323 CVE-2024-13556
2.47%
84.9th 8.1 This CVE describes a PHP object injection vulnerability in the Affiliate Links WordPress plugin. Una
324 CVE-2025-27210
2.44%
84.9th 7.5 This vulnerability is an incomplete fix for CVE-2025-23084 in Node.js that allows path traversal att
325 CVE-2025-55161
2.42%
84.8th 8.6 CVE-2025-55161 is a Server-Side Request Forgery (SSRF) vulnerability in Stirling-PDF's Markdown-to-P
326 CVE-2024-12878
2.42%
84.8th 7.1 This vulnerability in the Custom Block Builder WordPress plugin allows attackers to inject malicious
327 CVE-2024-10152
2.42%
84.8th 7.1 This vulnerability in the Simple Certain Time to Show Content WordPress plugin allows attackers to i
328 CVE-2024-13333
2.41%
84.8th 7.5 The Advanced File Manager WordPress plugin versions 5.2.12 to 5.2.13 allow authenticated attackers w
329 CVE-2025-49214
2.4%
84.7th 8.8 This vulnerability allows authenticated attackers to execute arbitrary code on Trend Micro Endpoint
330 CVE-2025-0798
2.38%
84.7th 8.1 This critical vulnerability in MicroWorld eScan Antivirus allows remote attackers to execute arbitra
331 CVE-2024-9362
2.38%
84.7th 7.5 An unauthenticated directory traversal vulnerability in Polyaxon allows attackers to access sensitiv
332 CVE-2025-4799
2.37%
84.6th 7.2 The WP-DownloadManager plugin for WordPress has a vulnerability allowing authenticated attackers wit
333 CVE-2024-11611
2.37%
84.6th 7.8 This vulnerability allows remote attackers to execute arbitrary code on AutomationDirect C-More EA9
334 CVE-2024-11610
2.37%
84.6th 7.8 This vulnerability allows remote attackers to execute arbitrary code on AutomationDirect C-More EA9
335 CVE-2025-27477
2.36%
84.6th 8.8 A heap-based buffer overflow vulnerability in Windows Telephony Service allows remote attackers to e
336 CVE-2025-8296
2.34%
84.6th 7.2 This SQL injection vulnerability in Ivanti Avalanche allows authenticated admin users to execute arb
337 CVE-2025-3294
2.33%
84.5th 7.2 The WP Editor WordPress plugin allows authenticated attackers with Administrator privileges to overw
338 CVE-2025-32409
2.33%
84.5th 8.1 This vulnerability allows remote attackers to execute arbitrary code on Ratta SuperNote A6 X2 Nomad
339 CVE-2025-48063
2.32%
84.5th 8.8 A bug in XWiki's required rights enforcement allows users with edit rights to set programming rights
340 CVE-2024-57011
2.29%
84.4th 8.8 This vulnerability allows remote attackers to execute arbitrary operating system commands on TOTOLIN
341 CVE-2025-2610
2.29%
84.4th 7.6 An authenticated stored cross-site scripting (XSS) vulnerability in MagnusBilling's Alarm Module all
342 CVE-2024-24451
2.28%
84.4th 7.5 A stack overflow vulnerability in OpenAirInterface's 5G AMF component allows attackers to cause deni
343 CVE-2025-0314
2.27%
84.3th 8.7 This vulnerability allows attackers to inject malicious scripts through improperly rendered file typ
344 CVE-2025-1724
2.27%
84.3th 7.4 This vulnerability allows attackers to take over AD-only accounts in Zoho Analytics products due to
345 CVE-2025-3693
2.25%
84.2th 8.8 This critical vulnerability in Tenda W12 routers allows remote attackers to execute arbitrary code v
346 CVE-2024-13170
2.22%
84.2th 7.5 This vulnerability allows remote unauthenticated attackers to cause denial of service through an out
347 CVE-2024-13168
2.22%
84.2th 7.5 An out-of-bounds write vulnerability in Ivanti Endpoint Manager (EPM) allows remote unauthenticated
348 CVE-2024-13167
2.22%
84.2th 7.5 An out-of-bounds write vulnerability in Ivanti Endpoint Manager (EPM) allows remote unauthenticated
349 CVE-2024-13166
2.22%
84.2th 7.5 An out-of-bounds write vulnerability in Ivanti Endpoint Manager (EPM) allows remote unauthenticated
350 CVE-2024-13165
2.22%
84.2th 7.5 An out-of-bounds write vulnerability in Ivanti Endpoint Manager (EPM) allows remote unauthenticated

What is EPSS?

The Exploit Prediction Scoring System (EPSS) is a data-driven model developed by FIRST.org that estimates the probability a CVE will be exploited in the wild within the next 30 days. Unlike CVSS which measures severity, EPSS measures likelihood of exploitation — making it ideal for prioritizing which vulnerabilities to patch first.

Why EPSS matters: With thousands of CVEs published monthly, not all vulnerabilities are equally dangerous. EPSS helps security teams focus on the CVEs most likely to be actively exploited, rather than patching solely by CVSS score. A critical CVSS 9.8 vulnerability with 0.1% EPSS may be less urgent than a high CVSS 7.5 with 90% EPSS.

Prioritize by Exploit Risk

Scan your servers and see which vulnerabilities have the highest EPSS scores. Focus on what attackers are actually targeting.

Start Monitoring Free