Most Exploitable CVEs - EPSS Rankings

CVEs ranked by EPSS (Exploit Prediction Scoring System) probability. Higher scores mean a greater likelihood of exploitation in the wild within the next 30 days.

164
EPSS > 50%
156
CISA KEV Listed
35,468
CVEs with EPSS
0.7%
Avg EPSS Score
All Critical High Medium Low
Rank CVE ID EPSS Score Percentile CVSS Flags Summary
3451 CVE-2025-61922
0.02%
3.2th 9.1 A critical authentication bypass vulnerability in PrestaShop Checkout payment module allows attacker
3452 CVE-2025-40934
0.02%
3.2th 9.3 CVE-2025-40934 is a critical signature validation bypass vulnerability in XML-Sig Perl module versio
3453 CVE-2026-1568
0.02%
3.1th 9.6 A signature verification vulnerability in Rapid7 InsightVM's Assertion Consumer Service allows attac
3454 CVE-2025-55205
0.02%
2.5th 9.0 A namespace label injection vulnerability in Capsule v0.10.3 and earlier allows authenticated tenant
3455 CVE-2025-59934
0.02%
2.6th 9.4 This vulnerability allows attackers to bypass authentication in Formbricks by forging JWT tokens wit
3456 CVE-2025-7743
0.02%
2.6th 9.6 Dolusoft Omaspot transmits sensitive information without encryption, allowing attackers to intercept
3457 CVE-2025-33187
0.02%
2.5th 9.3 This vulnerability in NVIDIA DGX Spark GB10's SROOT component allows attackers with privileged acces
3458 CVE-2025-52025
0.02%
2.6th 9.4 This SQL injection vulnerability in the Aptsys gemscms POS Platform allows attackers to execute arbi
3459 CVE-2025-70983
0.01%
2.3th 9.9 This vulnerability allows attackers with low-level privileges to escalate their privileges in Spring
3460 CVE-2025-67229
0.01%
2.2th 9.8 An improper certificate validation vulnerability in ToDesktop Builder v0.32.1 allows an unauthentica
3461 CVE-2025-68121
0.01%
2.4th 10.0 This vulnerability in Go's crypto/tls package allows TLS session resumption to succeed when it shoul
3462 CVE-2025-5319
0.01%
2.4th 9.8 This SQL injection vulnerability in DIGITA Efficiency Management System allows attackers to execute
3463 CVE-2026-24769
0.01%
2.5th 9.0 Authenticated users can upload malicious SVG files containing JavaScript in NocoDB versions before 0
3464 CVE-2026-22806
0.01%
2.2th 9.1 This vulnerability in vCluster Platform allows users with scoped access keys to bypass scope restric
3465 CVE-2025-1793
0.01%
1.9th 9.8 SQL injection vulnerabilities in multiple vector store integrations of run-llama/llama_index v0.12.2
3466 CVE-2026-22585
0.01%
1.9th 9.8 This CVE describes a broken cryptographic algorithm vulnerability in Salesforce Marketing Cloud Enga
3467 CVE-2025-70985
0.01%
1.8th 9.1 This vulnerability in RuoYi v4.8.2 allows unauthorized attackers to modify data they shouldn't have
3468 CVE-2025-4822
0.01%
1.4th 9.8 This SQL injection vulnerability in Bayraktar Solar Energies ScadaWatt Otopilot allows attackers to
3469 CVE-2025-66630
0.01%
1.6th 9.4 Fiber web framework versions before 2.52.11 on Go versions prior to 1.24 may generate predictable UU
3470 CVE-2025-64725
0.01%
1.4th 9.8 This vulnerability in Weblate allows one user to accept an invitation that was opened by another use
3471 CVE-2026-24785
0.01%
1.7th 9.1 Clatter versions before 2.2.0 have a protocol compliance vulnerability where post-quantum handshake
3472 CVE-2024-22611
0.01%
1.3th 9.8 CVE-2024-22611 is a critical SQL injection vulnerability in OpenEMR that allows attackers to execute
3473 CVE-2025-6830
0.01%
1.3th 9.8 This SQL injection vulnerability in Xpoda Studio allows attackers to execute arbitrary SQL commands
3474 CVE-2026-24399
0.01%
1.2th 9.3 This vulnerability allows attackers to inject malicious HTML/JavaScript payloads into ChatterMate ch
3475 CVE-2025-55130
0.01%
1.1th 9.1 A Node.js permissions model vulnerability allows attackers to bypass file system access restrictions
3476 CVE-2023-54337
0.01%
1.3th 9.1 Sysax Multi Server 6.95 contains a denial of service vulnerability where attackers can crash the app
3477 CVE-2025-54887
0.01%
1th 9.1 This vulnerability in the Ruby JWE library allows attackers to brute-force authentication tags in en
3478 CVE-2025-64314
0.01%
0.7th 9.3 A permission control vulnerability in the memory management module allows unauthorized access to sen
3479 CVE-2025-11492
0.01%
0.6th 9.6 CVE-2025-11492 allows man-in-the-middle attacks against ConnectWise Automate Agent when configured t
3480 CVE-2025-5329
0.01%
0.6th 9.8 This SQL injection vulnerability in Martcode Software's Delta Course Automation allows attackers to
3481 CVE-2026-23966
0.01%
0.5th 9.1 A private key recovery vulnerability exists in sm-crypto's SM2 decryption implementation, allowing a
3482 CVE-2025-63729
0.01%
0.3th 9.0 This vulnerability allows attackers to extract SSL/TLS private keys and certificates from Syrotech G
3483 CVE-2026-0106
0%
0.1th 9.3 This vulnerability allows local attackers to map arbitrary memory addresses due to missing bounds ch
3484 CVE-2026-25848
0%
0th 9.1 This authentication bypass vulnerability in JetBrains Hub allows attackers to perform administrative

What is EPSS?

The Exploit Prediction Scoring System (EPSS) is a data-driven model developed by FIRST.org that estimates the probability a CVE will be exploited in the wild within the next 30 days. Unlike CVSS which measures severity, EPSS measures likelihood of exploitation — making it ideal for prioritizing which vulnerabilities to patch first.

Why EPSS matters: With thousands of CVEs published monthly, not all vulnerabilities are equally dangerous. EPSS helps security teams focus on the CVEs most likely to be actively exploited, rather than patching solely by CVSS score. A critical CVSS 9.8 vulnerability with 0.1% EPSS may be less urgent than a high CVSS 7.5 with 90% EPSS.

Prioritize by Exploit Risk

Scan your servers and see which vulnerabilities have the highest EPSS scores. Focus on what attackers are actually targeting.

Start Monitoring Free