Most Exploitable CVEs - EPSS Rankings
CVEs ranked by EPSS (Exploit Prediction Scoring System) probability. Higher scores mean a greater likelihood of exploitation in the wild within the next 30 days.
| Rank | CVE ID | EPSS Score | Percentile | CVSS | Flags | Summary |
|---|---|---|---|---|---|---|
| 301 | CVE-2025-22352 |
|
86.1th | 7.6 | This SQL injection vulnerability in the ELEX WooCommerce Advanced Bulk Edit plugin allows attackers | |
| 302 | CVE-2024-11170 |
|
86th | 8.8 | A path traversal vulnerability in danny-avila/librechat allows attackers to write files to arbitrary | |
| 303 | CVE-2025-2328 |
|
86th | 8.8 | This vulnerability allows unauthenticated attackers to delete arbitrary files on WordPress servers u | |
| 304 | CVE-2024-48245 |
|
85.9th | 7.2 | Vehicle Management System 1.0 contains SQL injection vulnerabilities in POST parameters that allow g | |
| 305 | CVE-2025-4255 |
|
85.8th | 7.3 | A critical buffer overflow vulnerability in PCMan FTP Server 2.0.7 allows remote attackers to execut | |
| 306 | CVE-2025-21396 |
|
85.8th | 8.2 | This vulnerability allows unauthorized attackers to elevate privileges in Microsoft Account systems | |
| 307 | CVE-2025-66516 |
|
85.6th | 8.4 | This critical XXE vulnerability in Apache Tika allows attackers to perform XML External Entity injec | |
| 308 | CVE-2025-47161 |
|
85.6th | 7.8 | CVE-2025-47161 is an improper access control vulnerability in Microsoft Defender for Endpoint that a | |
| 309 | CVE-2025-25293 |
|
85.6th | 7.5 | This vulnerability in ruby-saml allows remote attackers to cause Denial of Service (DoS) by sending | |
| 310 | CVE-2024-13359 |
|
85.6th | 8.1 | The Product Input Fields for WooCommerce WordPress plugin has an arbitrary file upload vulnerability | |
| 311 | CVE-2025-47917 |
|
85.5th | 8.9 | Mbed TLS versions before 3.6.4 contain a use-after-free vulnerability in the mbedtls_x509_string_to_ | |
| 312 | CVE-2025-55763 |
|
85.5th | 7.5 | A buffer overflow vulnerability in CivetWeb's URI parser allows remote attackers to execute arbitrar | |
| 313 | CVE-2025-54769 |
|
85.5th | 8.8 | This vulnerability allows authenticated read-only users to upload files and perform directory traver | |
| 314 | CVE-2024-11609 |
|
85.3th | 7.8 | A stack-based buffer overflow vulnerability in AutomationDirect C-More EA9 programming software allo | |
| 315 | CVE-2024-12390 |
|
85.3th | 8.8 | This vulnerability allows remote attackers to execute arbitrary code on systems running vulnerable v | |
| 316 | CVE-2024-12389 |
|
85.3th | 8.8 | A path traversal vulnerability in binary-husky/gpt_academic allows attackers to write arbitrary file | |
| 317 | CVE-2025-3002 |
|
85.3th | 7.3 | This critical vulnerability in Digital China DCME-520 devices allows remote attackers to execute arb | |
| 318 | CVE-2025-54366 |
|
85.1th | 8.8 | CVE-2025-54366 is a critical deserialization vulnerability in FreeScout help desk software that allo | |
| 319 | CVE-2025-52089 |
|
85.1th | 8.8 | This vulnerability allows authenticated attackers to execute arbitrary operating system commands wit | |
| 320 | CVE-2025-0624 |
|
85th | 7.6 | This CVE-2025-0624 vulnerability in grub2 allows remote attackers on the same network segment to exe | |
| 321 | CVE-2025-55141 |
|
85th | 8.8 | This CVE describes a missing authorization vulnerability in Ivanti security products that allows aut | |
| 322 | CVE-2026-21514 |
|
85th | 7.8 | KEV | This vulnerability in Microsoft Office Word allows attackers to bypass local security features by ma |
| 323 | CVE-2024-13556 |
|
84.9th | 8.1 | This CVE describes a PHP object injection vulnerability in the Affiliate Links WordPress plugin. Una | |
| 324 | CVE-2025-27210 |
|
84.9th | 7.5 | This vulnerability is an incomplete fix for CVE-2025-23084 in Node.js that allows path traversal att | |
| 325 | CVE-2025-55161 |
|
84.8th | 8.6 | CVE-2025-55161 is a Server-Side Request Forgery (SSRF) vulnerability in Stirling-PDF's Markdown-to-P | |
| 326 | CVE-2024-12878 |
|
84.8th | 7.1 | This vulnerability in the Custom Block Builder WordPress plugin allows attackers to inject malicious | |
| 327 | CVE-2024-10152 |
|
84.8th | 7.1 | This vulnerability in the Simple Certain Time to Show Content WordPress plugin allows attackers to i | |
| 328 | CVE-2024-13333 |
|
84.8th | 7.5 | The Advanced File Manager WordPress plugin versions 5.2.12 to 5.2.13 allow authenticated attackers w | |
| 329 | CVE-2025-49214 |
|
84.7th | 8.8 | This vulnerability allows authenticated attackers to execute arbitrary code on Trend Micro Endpoint | |
| 330 | CVE-2025-0798 |
|
84.7th | 8.1 | This critical vulnerability in MicroWorld eScan Antivirus allows remote attackers to execute arbitra | |
| 331 | CVE-2024-9362 |
|
84.7th | 7.5 | An unauthenticated directory traversal vulnerability in Polyaxon allows attackers to access sensitiv | |
| 332 | CVE-2025-4799 |
|
84.6th | 7.2 | The WP-DownloadManager plugin for WordPress has a vulnerability allowing authenticated attackers wit | |
| 333 | CVE-2024-11611 |
|
84.6th | 7.8 | This vulnerability allows remote attackers to execute arbitrary code on AutomationDirect C-More EA9 | |
| 334 | CVE-2024-11610 |
|
84.6th | 7.8 | This vulnerability allows remote attackers to execute arbitrary code on AutomationDirect C-More EA9 | |
| 335 | CVE-2025-27477 |
|
84.6th | 8.8 | A heap-based buffer overflow vulnerability in Windows Telephony Service allows remote attackers to e | |
| 336 | CVE-2025-8296 |
|
84.6th | 7.2 | This SQL injection vulnerability in Ivanti Avalanche allows authenticated admin users to execute arb | |
| 337 | CVE-2025-3294 |
|
84.5th | 7.2 | The WP Editor WordPress plugin allows authenticated attackers with Administrator privileges to overw | |
| 338 | CVE-2025-32409 |
|
84.5th | 8.1 | This vulnerability allows remote attackers to execute arbitrary code on Ratta SuperNote A6 X2 Nomad | |
| 339 | CVE-2025-48063 |
|
84.5th | 8.8 | A bug in XWiki's required rights enforcement allows users with edit rights to set programming rights | |
| 340 | CVE-2024-57011 |
|
84.4th | 8.8 | This vulnerability allows remote attackers to execute arbitrary operating system commands on TOTOLIN | |
| 341 | CVE-2025-2610 |
|
84.4th | 7.6 | An authenticated stored cross-site scripting (XSS) vulnerability in MagnusBilling's Alarm Module all | |
| 342 | CVE-2024-24451 |
|
84.4th | 7.5 | A stack overflow vulnerability in OpenAirInterface's 5G AMF component allows attackers to cause deni | |
| 343 | CVE-2025-0314 |
|
84.3th | 8.7 | This vulnerability allows attackers to inject malicious scripts through improperly rendered file typ | |
| 344 | CVE-2025-1724 |
|
84.3th | 7.4 | This vulnerability allows attackers to take over AD-only accounts in Zoho Analytics products due to | |
| 345 | CVE-2025-3693 |
|
84.2th | 8.8 | This critical vulnerability in Tenda W12 routers allows remote attackers to execute arbitrary code v | |
| 346 | CVE-2024-13170 |
|
84.2th | 7.5 | This vulnerability allows remote unauthenticated attackers to cause denial of service through an out | |
| 347 | CVE-2024-13168 |
|
84.2th | 7.5 | An out-of-bounds write vulnerability in Ivanti Endpoint Manager (EPM) allows remote unauthenticated | |
| 348 | CVE-2024-13167 |
|
84.2th | 7.5 | An out-of-bounds write vulnerability in Ivanti Endpoint Manager (EPM) allows remote unauthenticated | |
| 349 | CVE-2024-13166 |
|
84.2th | 7.5 | An out-of-bounds write vulnerability in Ivanti Endpoint Manager (EPM) allows remote unauthenticated | |
| 350 | CVE-2024-13165 |
|
84.2th | 7.5 | An out-of-bounds write vulnerability in Ivanti Endpoint Manager (EPM) allows remote unauthenticated |
What is EPSS?
The Exploit Prediction Scoring System (EPSS) is a data-driven model developed by FIRST.org that estimates the probability a CVE will be exploited in the wild within the next 30 days. Unlike CVSS which measures severity, EPSS measures likelihood of exploitation — making it ideal for prioritizing which vulnerabilities to patch first.
Why EPSS matters: With thousands of CVEs published monthly, not all vulnerabilities are equally dangerous. EPSS helps security teams focus on the CVEs most likely to be actively exploited, rather than patching solely by CVSS score. A critical CVSS 9.8 vulnerability with 0.1% EPSS may be less urgent than a high CVSS 7.5 with 90% EPSS.
Prioritize by Exploit Risk
Scan your servers and see which vulnerabilities have the highest EPSS scores. Focus on what attackers are actually targeting.
Start Monitoring Free