Most Exploitable CVEs - EPSS Rankings
CVEs ranked by EPSS (Exploit Prediction Scoring System) probability. Higher scores mean a greater likelihood of exploitation in the wild within the next 30 days.
| Rank | CVE ID | EPSS Score | Percentile | CVSS | Flags | Summary |
|---|---|---|---|---|---|---|
| 3451 | CVE-2025-61922 |
|
3.2th | 9.1 | A critical authentication bypass vulnerability in PrestaShop Checkout payment module allows attacker | |
| 3452 | CVE-2025-40934 |
|
3.2th | 9.3 | CVE-2025-40934 is a critical signature validation bypass vulnerability in XML-Sig Perl module versio | |
| 3453 | CVE-2026-1568 |
|
3.1th | 9.6 | A signature verification vulnerability in Rapid7 InsightVM's Assertion Consumer Service allows attac | |
| 3454 | CVE-2025-55205 |
|
2.5th | 9.0 | A namespace label injection vulnerability in Capsule v0.10.3 and earlier allows authenticated tenant | |
| 3455 | CVE-2025-59934 |
|
2.6th | 9.4 | This vulnerability allows attackers to bypass authentication in Formbricks by forging JWT tokens wit | |
| 3456 | CVE-2025-7743 |
|
2.6th | 9.6 | Dolusoft Omaspot transmits sensitive information without encryption, allowing attackers to intercept | |
| 3457 | CVE-2025-33187 |
|
2.5th | 9.3 | This vulnerability in NVIDIA DGX Spark GB10's SROOT component allows attackers with privileged acces | |
| 3458 | CVE-2025-52025 |
|
2.6th | 9.4 | This SQL injection vulnerability in the Aptsys gemscms POS Platform allows attackers to execute arbi | |
| 3459 | CVE-2025-70983 |
|
2.3th | 9.9 | This vulnerability allows attackers with low-level privileges to escalate their privileges in Spring | |
| 3460 | CVE-2025-67229 |
|
2.2th | 9.8 | An improper certificate validation vulnerability in ToDesktop Builder v0.32.1 allows an unauthentica | |
| 3461 | CVE-2025-68121 |
|
2.4th | 10.0 | This vulnerability in Go's crypto/tls package allows TLS session resumption to succeed when it shoul | |
| 3462 | CVE-2025-5319 |
|
2.4th | 9.8 | This SQL injection vulnerability in DIGITA Efficiency Management System allows attackers to execute | |
| 3463 | CVE-2026-24769 |
|
2.5th | 9.0 | Authenticated users can upload malicious SVG files containing JavaScript in NocoDB versions before 0 | |
| 3464 | CVE-2026-22806 |
|
2.2th | 9.1 | This vulnerability in vCluster Platform allows users with scoped access keys to bypass scope restric | |
| 3465 | CVE-2025-1793 |
|
1.9th | 9.8 | SQL injection vulnerabilities in multiple vector store integrations of run-llama/llama_index v0.12.2 | |
| 3466 | CVE-2026-22585 |
|
1.9th | 9.8 | This CVE describes a broken cryptographic algorithm vulnerability in Salesforce Marketing Cloud Enga | |
| 3467 | CVE-2025-70985 |
|
1.8th | 9.1 | This vulnerability in RuoYi v4.8.2 allows unauthorized attackers to modify data they shouldn't have | |
| 3468 | CVE-2025-4822 |
|
1.4th | 9.8 | This SQL injection vulnerability in Bayraktar Solar Energies ScadaWatt Otopilot allows attackers to | |
| 3469 | CVE-2025-66630 |
|
1.6th | 9.4 | Fiber web framework versions before 2.52.11 on Go versions prior to 1.24 may generate predictable UU | |
| 3470 | CVE-2025-64725 |
|
1.4th | 9.8 | This vulnerability in Weblate allows one user to accept an invitation that was opened by another use | |
| 3471 | CVE-2026-24785 |
|
1.7th | 9.1 | Clatter versions before 2.2.0 have a protocol compliance vulnerability where post-quantum handshake | |
| 3472 | CVE-2024-22611 |
|
1.3th | 9.8 | CVE-2024-22611 is a critical SQL injection vulnerability in OpenEMR that allows attackers to execute | |
| 3473 | CVE-2025-6830 |
|
1.3th | 9.8 | This SQL injection vulnerability in Xpoda Studio allows attackers to execute arbitrary SQL commands | |
| 3474 | CVE-2026-24399 |
|
1.2th | 9.3 | This vulnerability allows attackers to inject malicious HTML/JavaScript payloads into ChatterMate ch | |
| 3475 | CVE-2025-55130 |
|
1.1th | 9.1 | A Node.js permissions model vulnerability allows attackers to bypass file system access restrictions | |
| 3476 | CVE-2023-54337 |
|
1.3th | 9.1 | Sysax Multi Server 6.95 contains a denial of service vulnerability where attackers can crash the app | |
| 3477 | CVE-2025-54887 |
|
1th | 9.1 | This vulnerability in the Ruby JWE library allows attackers to brute-force authentication tags in en | |
| 3478 | CVE-2025-64314 |
|
0.7th | 9.3 | A permission control vulnerability in the memory management module allows unauthorized access to sen | |
| 3479 | CVE-2025-11492 |
|
0.6th | 9.6 | CVE-2025-11492 allows man-in-the-middle attacks against ConnectWise Automate Agent when configured t | |
| 3480 | CVE-2025-5329 |
|
0.6th | 9.8 | This SQL injection vulnerability in Martcode Software's Delta Course Automation allows attackers to | |
| 3481 | CVE-2026-23966 |
|
0.5th | 9.1 | A private key recovery vulnerability exists in sm-crypto's SM2 decryption implementation, allowing a | |
| 3482 | CVE-2025-63729 |
|
0.3th | 9.0 | This vulnerability allows attackers to extract SSL/TLS private keys and certificates from Syrotech G | |
| 3483 | CVE-2026-0106 |
|
0.1th | 9.3 | This vulnerability allows local attackers to map arbitrary memory addresses due to missing bounds ch | |
| 3484 | CVE-2026-25848 |
|
0th | 9.1 | This authentication bypass vulnerability in JetBrains Hub allows attackers to perform administrative |
What is EPSS?
The Exploit Prediction Scoring System (EPSS) is a data-driven model developed by FIRST.org that estimates the probability a CVE will be exploited in the wild within the next 30 days. Unlike CVSS which measures severity, EPSS measures likelihood of exploitation — making it ideal for prioritizing which vulnerabilities to patch first.
Why EPSS matters: With thousands of CVEs published monthly, not all vulnerabilities are equally dangerous. EPSS helps security teams focus on the CVEs most likely to be actively exploited, rather than patching solely by CVSS score. A critical CVSS 9.8 vulnerability with 0.1% EPSS may be less urgent than a high CVSS 7.5 with 90% EPSS.
Prioritize by Exploit Risk
Scan your servers and see which vulnerabilities have the highest EPSS scores. Focus on what attackers are actually targeting.
Start Monitoring Free