Most Exploitable CVEs - EPSS Rankings

CVEs ranked by EPSS (Exploit Prediction Scoring System) probability. Higher scores mean a greater likelihood of exploitation in the wild within the next 30 days.

164
EPSS > 50%
156
CISA KEV Listed
35,468
CVEs with EPSS
0.7%
Avg EPSS Score
All Critical High Medium Low
Rank CVE ID EPSS Score Percentile CVSS Flags Summary
3501 CVE-2025-23579
0.09%
25.8th 6.5 This stored cross-site scripting (XSS) vulnerability in the DZS Ajaxer Lite WordPress plugin allows
3502 CVE-2025-23480
0.09%
25.8th 6.5 This stored cross-site scripting (XSS) vulnerability in the RSVP ME WordPress plugin allows attacker
3503 CVE-2025-22095
0.09%
25.8th 5.5 A kernel panic vulnerability exists in the Linux kernel's Broadcom STB PCIe driver when regulator_bu
3504 CVE-2025-2408
0.09%
25.8th 5.3 This vulnerability allows users to bypass IP-based access restrictions in GitLab, potentially exposi
3505 CVE-2025-21997
0.09%
25.8th 5.5 This CVE describes an integer overflow vulnerability in the Linux kernel's XDP socket (xsk) subsyste
3506 CVE-2025-21994
0.09%
25.8th 5.5 This CVE-2025-21994 is a Linux kernel vulnerability in the ksmbd SMB server component where improper
3507 CVE-2025-21980
0.09%
25.8th 5.5 A NULL pointer dereference vulnerability in the Linux kernel's GRED scheduler could cause kernel cra
3508 CVE-2025-21970
0.09%
25.8th 5.5 A NULL pointer dereference vulnerability in the Linux kernel's mlx5 bridge driver can cause a kernel
3509 CVE-2025-21964
0.09%
25.8th 5.5 This CVE-2025-21964 vulnerability in the Linux kernel's CIFS filesystem driver allows integer overfl
3510 CVE-2025-21962
0.09%
25.8th 5.5 An integer overflow vulnerability in the Linux kernel's CIFS filesystem driver allows attackers to c
3511 CVE-2025-21960
0.09%
25.8th 5.5 This is a Linux kernel vulnerability in the Broadcom NetXtreme Ethernet driver (bnxt) where duplicat
3512 CVE-2025-21936
0.09%
25.8th 5.5 This CVE describes a null pointer dereference vulnerability in the Linux kernel's Bluetooth subsyste
3513 CVE-2025-31947
0.09%
25.8th 5.8 Mattermost fails to implement account lockout for LDAP users after repeated failed login attempts, a
3514 CVE-2025-6854
0.09%
25.7th 4.3 This path traversal vulnerability in Langchain-Chatchat allows attackers to access files outside the
3515 CVE-2025-6365
0.09%
25.7th 5.7 This vulnerability in HobbesOSR Kitten's set_pte_at function allows attackers to cause resource cons
3516 CVE-2025-47049
0.09%
25.8th 6.1 Adobe Experience Manager versions 6.5.22 and earlier contain a DOM-based Cross-Site Scripting vulner
3517 CVE-2025-31325
0.09%
25.7th 5.8 This CVE describes a Cross-Site Scripting vulnerability in SAP NetWeaver's ABAP Keyword Documentatio
3518 CVE-2025-51529
0.09%
25.6th 5.3 This vulnerability allows remote attackers to cause denial of service through database resource exha
3519 CVE-2025-25006
0.09%
25.7th 5.3 This vulnerability in Microsoft Exchange Server allows an unauthorized attacker to perform spoofing
3520 CVE-2025-59463
0.09%
25.7th 4.3 This vulnerability allows attackers to cause chunk-size mismatches during file transfers, blocking c
3521 CVE-2025-8483
0.09%
25.7th 6.3 This vulnerability allows authenticated WordPress users with Subscriber-level access or higher to ex
3522 CVE-2025-59269
0.09%
25.7th 6.1 A stored cross-site scripting (XSS) vulnerability in the BIG-IP Configuration utility allows attacke
3523 CVE-2025-9640
0.09%
25.6th 4.3 This CVE-2025-9640 vulnerability in Samba's vfs_streams_xattr module allows authenticated users to r
3524 CVE-2025-54168
0.09%
25.8th 4.8 A stored cross-site scripting (XSS) vulnerability in QuLog Center allows authenticated attackers wit
3525 CVE-2025-14080
0.09%
25.7th 5.3 This vulnerability allows unauthenticated attackers to modify any WordPress post by exploiting missi
3526 CVE-2025-12348
0.09%
25.7th 5.3 This vulnerability allows unauthenticated attackers to execute scheduled actions in the Icegram Expr
3527 CVE-2025-12655
0.09%
25.7th 5.3 This vulnerability allows unauthenticated attackers to write arbitrary JSON files to the server's pu
3528 CVE-2025-67502
0.09%
25.8th 5.4 This vulnerability allows attackers to craft malicious URLs that redirect authenticated Taguette use
3529 CVE-2025-2848
0.09%
25.7th 6.3 This vulnerability in Synology Mail Server allows authenticated remote attackers to modify non-sensi
3530 CVE-2026-2062
0.09%
25.6th 5.3 This CVE describes a null pointer dereference vulnerability in Open5GS PGW S5U Address Handler that
3531 CVE-2025-12718
0.09%
25.7th 5.8 The Quick Contact Form WordPress plugin contains an open mail relay vulnerability that allows unauth
3532 CVE-2026-22239
0.09%
25.7th 5.3 This vulnerability in BLUVOYIX allows unauthenticated attackers to send spam emails using the compan
3533 CVE-2026-20812
0.09%
25.7th 6.5 This vulnerability allows an authorized attacker to perform tampering attacks against Windows LDAP s
3534 CVE-2025-11370
0.09%
25.7th 5.3 This vulnerability allows unauthenticated attackers to modify pop-up display settings in WordPress s
3535 CVE-2025-24751
0.09%
25.5th 4.3 This CVE describes a missing authorization vulnerability in GoDaddy's CoBlocks WordPress plugin that
3536 CVE-2025-24725
0.09%
25.5th 4.3 This CVE describes a missing authorization vulnerability in the ThimPress Thim Elementor Kit WordPre
3537 CVE-2025-24682
0.09%
25.5th 4.3 This CVE describes a missing authorization vulnerability in the Super Block Slider WordPress plugin
3538 CVE-2025-24679
0.09%
25.5th 4.3 This CVE describes a missing authorization vulnerability in the WordPress Internal Links Manager plu
3539 CVE-2023-37010
0.09%
25.5th 6.3 This vulnerability allows remote attackers to cause denial of service by sending specially crafted A
3540 CVE-2025-22721
0.09%
25.5th 4.3 This CVE describes a missing authorization vulnerability in the ApplyOnline WordPress plugin that al
3541 CVE-2024-13270
0.09%
25.5th 4.3 This CVE describes an incorrect authorization vulnerability in Drupal's Freelinking module that allo
3542 CVE-2025-0227
0.09%
25.6th 4.3 This vulnerability allows remote attackers to read arbitrary files on Tsinghua Unigroup Electronic A
3543 CVE-2025-0206
0.09%
25.4th 5.3 CVE-2025-0206 is a critical improper access control vulnerability in code-projects Online Shoe Store
3544 CVE-2025-25802
0.09%
25.5th 5.1 SeaCMS v13.3 contains a remote code execution vulnerability in the admin_ip.php component that allow
3545 CVE-2025-25796
0.09%
25.5th 5.1 SeaCMS v13.3 contains a remote code execution vulnerability in admin_template.php that allows attack
3546 CVE-2025-25793
0.09%
25.5th 5.1 SeaCMS v13.3 contains a remote code execution vulnerability in the admin_notify.php component that a
3547 CVE-2022-49475
0.09%
25.6th 5.5 This CVE describes a null pointer dereference vulnerability in the Linux kernel's SPI-FSL-QSPI drive
3548 CVE-2025-26983
0.09%
25.5th 4.3 This CVE describes a Missing Authorization vulnerability in WPZOOM Recipe Card Blocks for WordPress
3549 CVE-2025-21124
0.09%
25.5th 5.5 Adobe InDesign has an out-of-bounds read vulnerability that could allow attackers to read sensitive
3550 CVE-2025-30344
0.09%
25.6th 5.3 This vulnerability allows attackers to determine whether specific usernames exist in OpenSlides syst

What is EPSS?

The Exploit Prediction Scoring System (EPSS) is a data-driven model developed by FIRST.org that estimates the probability a CVE will be exploited in the wild within the next 30 days. Unlike CVSS which measures severity, EPSS measures likelihood of exploitation — making it ideal for prioritizing which vulnerabilities to patch first.

Why EPSS matters: With thousands of CVEs published monthly, not all vulnerabilities are equally dangerous. EPSS helps security teams focus on the CVEs most likely to be actively exploited, rather than patching solely by CVSS score. A critical CVSS 9.8 vulnerability with 0.1% EPSS may be less urgent than a high CVSS 7.5 with 90% EPSS.

Prioritize by Exploit Risk

Scan your servers and see which vulnerabilities have the highest EPSS scores. Focus on what attackers are actually targeting.

Start Monitoring Free