Most Exploitable CVEs - EPSS Rankings
CVEs ranked by EPSS (Exploit Prediction Scoring System) probability. Higher scores mean a greater likelihood of exploitation in the wild within the next 30 days.
| Rank | CVE ID | EPSS Score | Percentile | CVSS | Flags | Summary |
|---|---|---|---|---|---|---|
| 3501 | CVE-2025-20674 |
|
56.3th | 9.8 | This vulnerability in MediaTek WLAN AP drivers allows attackers to inject arbitrary packets without | |
| 3502 | CVE-2025-9846 |
|
56.2th | 10.0 | This critical vulnerability in Inka.Net allows attackers to upload malicious files and execute arbit | |
| 3503 | CVE-2023-53970 |
|
56.3th | 7.5 | This authentication bypass vulnerability in Screen SFT DAB 600/C devices allows attackers to reset d | |
| 3504 | CVE-2023-53969 |
|
56.3th | 7.5 | This authentication bypass vulnerability in Screen SFT DAB 600/C firmware allows attackers to change | |
| 3505 | CVE-2023-53967 |
|
56.3th | 7.5 | This authentication bypass vulnerability in Screen SFT DAB 600/C firmware allows attackers to change | |
| 3506 | CVE-2024-54497 |
|
56.2th | 6.5 | This vulnerability in Apple operating systems allows processing malicious web content to cause denia | |
| 3507 | CVE-2025-30223 |
|
56.2th | 9.3 | A Cross-Site Scripting (XSS) vulnerability in Beego's RenderForm() function allows attackers to inje | |
| 3508 | CVE-2025-2586 |
|
56.2th | 7.5 | CVE-2025-2586 is an unauthenticated API request flooding vulnerability in OpenShift Lightspeed Servi | |
| 3509 | CVE-2025-27598 |
|
56.2th | 7.5 | An out-of-bounds write vulnerability in ImageSharp's GIF decoder allows attackers to cause denial of | |
| 3510 | CVE-2025-54381 |
|
56.2th | 9.9 | This CVE describes a Server-Side Request Forgery (SSRF) vulnerability in BentoML's file upload syste | |
| 3511 | CVE-2025-8625 |
|
56.2th | 9.8 | The Copypress Rest API WordPress plugin versions 1.1 to 1.2 contain a critical remote code execution | |
| 3512 | CVE-2025-10619 |
|
56.2th | 6.3 | This vulnerability allows remote attackers to execute arbitrary operating system commands via comman | |
| 3513 | CVE-2025-55729 |
|
56.2th | 10.0 | CVE-2025-55729 is a critical remote code execution vulnerability in XWiki Remote Macros that allows | |
| 3514 | CVE-2025-63402 |
|
56.2th | 5.5 | This vulnerability in HCLTech GRAGON allows remote attackers to execute arbitrary code by exploiting | |
| 3515 | CVE-2026-0784 |
|
56.2th | 8.8 | This vulnerability allows authenticated remote attackers to execute arbitrary system commands on ALG | |
| 3516 | CVE-2026-0783 |
|
56.2th | 8.8 | This vulnerability allows authenticated remote attackers to execute arbitrary system commands on ALG | |
| 3517 | CVE-2026-0782 |
|
56.2th | 8.8 | This vulnerability allows authenticated remote attackers to execute arbitrary system commands on ALG | |
| 3518 | CVE-2026-0781 |
|
56.2th | 8.8 | This vulnerability allows authenticated remote attackers to execute arbitrary system commands on ALG | |
| 3519 | CVE-2026-0780 |
|
56.2th | 8.8 | This vulnerability allows authenticated remote attackers to execute arbitrary system commands on ALG | |
| 3520 | CVE-2025-15458 |
|
56.2th | 7.3 | This vulnerability allows attackers to bypass authentication in MiniCMS versions up to 1.8 by exploi | |
| 3521 | CVE-2025-15457 |
|
56.2th | 7.3 | This vulnerability allows remote attackers to bypass authentication in MiniCMS's trash file restore | |
| 3522 | CVE-2024-40765 |
|
56.2th | 9.8 | An integer-based buffer overflow vulnerability in SonicOS IPSec implementation allows remote attacke | |
| 3523 | CVE-2025-0237 |
|
56.1th | 5.4 | This vulnerability in Mozilla's WebChannel API allows privilege escalation by accepting arbitrary pr | |
| 3524 | CVE-2024-12742 |
|
56.2th | 7.8 | This vulnerability allows arbitrary code execution through deserialization of untrusted data in NI G | |
| 3525 | CVE-2025-30722 |
|
56.1th | 5.3 | A vulnerability in Oracle MySQL's mysqldump client allows low-privileged attackers with network acce | |
| 3526 | CVE-2025-13262 |
|
56.2th | 7.3 | A path traversal vulnerability in lsfusion platform allows remote attackers to manipulate file paths | |
| 3527 | CVE-2025-30817 |
|
56th | 5.4 | This CVE describes a missing authorization vulnerability in the wpzita Z Companion WordPress plugin | |
| 3528 | CVE-2025-32218 |
|
56th | 5.4 | This CVE describes a missing authorization vulnerability in the TableOn WordPress plugin that allows | |
| 3529 | CVE-2025-4897 |
|
56th | 8.8 | This critical vulnerability in Tenda A15 routers allows remote attackers to execute arbitrary code v | |
| 3530 | CVE-2025-4054 |
|
56th | 6.1 | The Relevanssi WordPress plugin has a stored XSS vulnerability in its highlights functionality that | |
| 3531 | CVE-2025-6734 |
|
56.1th | 8.8 | A critical buffer overflow vulnerability in UTT HiPER 840G routers allows remote attackers to execut | |
| 3532 | CVE-2025-6732 |
|
56.1th | 8.8 | A critical buffer overflow vulnerability in UTT HiPER 840G routers allows remote attackers to execut | |
| 3533 | CVE-2025-27212 |
|
56.1th | 9.8 | This CVE describes an improper input validation vulnerability in UniFi Access devices that allows co | |
| 3534 | CVE-2025-54374 |
|
56.1th | 8.8 | CVE-2025-54374 is a one-click remote code execution vulnerability in Eidos Personal Data Management | |
| 3535 | CVE-2025-14420 |
|
56.1th | 7.8 | This vulnerability allows remote attackers to execute arbitrary code on systems running vulnerable v | |
| 3536 | CVE-2025-14413 |
|
56.1th | 7.8 | This vulnerability allows remote attackers to execute arbitrary code on Soda PDF Desktop by tricking | |
| 3537 | CVE-2025-47270 |
|
56.1th | 7.5 | This vulnerability allows attackers to cause Denial of Service (DoS) by sending specially crafted Di | |
| 3538 | CVE-2025-24057 |
|
56th | 7.8 | A heap-based buffer overflow vulnerability in Microsoft Office allows attackers to execute arbitrary | |
| 3539 | CVE-2025-21180 |
|
56th | 7.8 | A heap-based buffer overflow vulnerability in the Windows exFAT file system driver allows local atta | |
| 3540 | CVE-2025-39527 |
|
55.9th | 8.8 | This vulnerability allows attackers to inject malicious objects through deserialization of untrusted | |
| 3541 | CVE-2025-32662 |
|
55.9th | 8.8 | A deserialization vulnerability in the Stylemix uListing WordPress plugin allows attackers to inject | |
| 3542 | CVE-2025-24908 |
|
56th | 6.8 | This path traversal vulnerability in Hitachi Vantara Pentaho Data Integration & Analytics allows att | |
| 3543 | CVE-2025-32144 |
|
55.9th | 8.8 | A PHP object injection vulnerability in the Job Board Manager WordPress plugin allows attackers to e | |
| 3544 | CVE-2025-32370 |
|
55.9th | 7.2 | Kentico Xperience CMS versions before 13.0.178 allow unauthenticated attackers to bypass file extens | |
| 3545 | CVE-2025-1805 |
|
55.9th | 5.3 | CVE-2025-1805 is a cryptographic vulnerability in Crypt::Salt for Perl version 0.01 where the insecu | |
| 3546 | CVE-2025-30892 |
|
55.9th | 8.8 | This vulnerability allows attackers to inject malicious objects through deserialization of untrusted | |
| 3547 | CVE-2025-29069 |
|
55.9th | 7.3 | A heap buffer overflow vulnerability exists in lcms2-2.16's UnrollChunkyBytes function in cmspack.c, | |
| 3548 | CVE-2025-7640 |
|
56th | 8.1 | This CSRF vulnerability in the hiWeb Export Posts WordPress plugin allows unauthenticated attackers | |
| 3549 | CVE-2025-8913 |
|
55.9th | 9.8 | CVE-2025-8913 is a critical Local File Inclusion vulnerability in WellChoose's Organization Portal S | |
| 3550 | CVE-2025-8805 |
|
56th | 5.3 | A denial-of-service vulnerability exists in Open5GS SMF component where the smf_gsm_state_wait_pfcp_ |
What is EPSS?
The Exploit Prediction Scoring System (EPSS) is a data-driven model developed by FIRST.org that estimates the probability a CVE will be exploited in the wild within the next 30 days. Unlike CVSS which measures severity, EPSS measures likelihood of exploitation — making it ideal for prioritizing which vulnerabilities to patch first.
Why EPSS matters: With thousands of CVEs published monthly, not all vulnerabilities are equally dangerous. EPSS helps security teams focus on the CVEs most likely to be actively exploited, rather than patching solely by CVSS score. A critical CVSS 9.8 vulnerability with 0.1% EPSS may be less urgent than a high CVSS 7.5 with 90% EPSS.
Prioritize by Exploit Risk
Scan your servers and see which vulnerabilities have the highest EPSS scores. Focus on what attackers are actually targeting.
Start Monitoring Free