Most Exploitable CVEs - EPSS Rankings
CVEs ranked by EPSS (Exploit Prediction Scoring System) probability. Higher scores mean a greater likelihood of exploitation in the wild within the next 30 days.
| Rank | CVE ID | EPSS Score | Percentile | CVSS | Flags | Summary |
|---|---|---|---|---|---|---|
| 3501 | CVE-2025-23579 |
|
25.8th | 6.5 | This stored cross-site scripting (XSS) vulnerability in the DZS Ajaxer Lite WordPress plugin allows | |
| 3502 | CVE-2025-23480 |
|
25.8th | 6.5 | This stored cross-site scripting (XSS) vulnerability in the RSVP ME WordPress plugin allows attacker | |
| 3503 | CVE-2025-22095 |
|
25.8th | 5.5 | A kernel panic vulnerability exists in the Linux kernel's Broadcom STB PCIe driver when regulator_bu | |
| 3504 | CVE-2025-2408 |
|
25.8th | 5.3 | This vulnerability allows users to bypass IP-based access restrictions in GitLab, potentially exposi | |
| 3505 | CVE-2025-21997 |
|
25.8th | 5.5 | This CVE describes an integer overflow vulnerability in the Linux kernel's XDP socket (xsk) subsyste | |
| 3506 | CVE-2025-21994 |
|
25.8th | 5.5 | This CVE-2025-21994 is a Linux kernel vulnerability in the ksmbd SMB server component where improper | |
| 3507 | CVE-2025-21980 |
|
25.8th | 5.5 | A NULL pointer dereference vulnerability in the Linux kernel's GRED scheduler could cause kernel cra | |
| 3508 | CVE-2025-21970 |
|
25.8th | 5.5 | A NULL pointer dereference vulnerability in the Linux kernel's mlx5 bridge driver can cause a kernel | |
| 3509 | CVE-2025-21964 |
|
25.8th | 5.5 | This CVE-2025-21964 vulnerability in the Linux kernel's CIFS filesystem driver allows integer overfl | |
| 3510 | CVE-2025-21962 |
|
25.8th | 5.5 | An integer overflow vulnerability in the Linux kernel's CIFS filesystem driver allows attackers to c | |
| 3511 | CVE-2025-21960 |
|
25.8th | 5.5 | This is a Linux kernel vulnerability in the Broadcom NetXtreme Ethernet driver (bnxt) where duplicat | |
| 3512 | CVE-2025-21936 |
|
25.8th | 5.5 | This CVE describes a null pointer dereference vulnerability in the Linux kernel's Bluetooth subsyste | |
| 3513 | CVE-2025-31947 |
|
25.8th | 5.8 | Mattermost fails to implement account lockout for LDAP users after repeated failed login attempts, a | |
| 3514 | CVE-2025-6854 |
|
25.7th | 4.3 | This path traversal vulnerability in Langchain-Chatchat allows attackers to access files outside the | |
| 3515 | CVE-2025-6365 |
|
25.7th | 5.7 | This vulnerability in HobbesOSR Kitten's set_pte_at function allows attackers to cause resource cons | |
| 3516 | CVE-2025-47049 |
|
25.8th | 6.1 | Adobe Experience Manager versions 6.5.22 and earlier contain a DOM-based Cross-Site Scripting vulner | |
| 3517 | CVE-2025-31325 |
|
25.7th | 5.8 | This CVE describes a Cross-Site Scripting vulnerability in SAP NetWeaver's ABAP Keyword Documentatio | |
| 3518 | CVE-2025-51529 |
|
25.6th | 5.3 | This vulnerability allows remote attackers to cause denial of service through database resource exha | |
| 3519 | CVE-2025-25006 |
|
25.7th | 5.3 | This vulnerability in Microsoft Exchange Server allows an unauthorized attacker to perform spoofing | |
| 3520 | CVE-2025-59463 |
|
25.7th | 4.3 | This vulnerability allows attackers to cause chunk-size mismatches during file transfers, blocking c | |
| 3521 | CVE-2025-8483 |
|
25.7th | 6.3 | This vulnerability allows authenticated WordPress users with Subscriber-level access or higher to ex | |
| 3522 | CVE-2025-59269 |
|
25.7th | 6.1 | A stored cross-site scripting (XSS) vulnerability in the BIG-IP Configuration utility allows attacke | |
| 3523 | CVE-2025-9640 |
|
25.6th | 4.3 | This CVE-2025-9640 vulnerability in Samba's vfs_streams_xattr module allows authenticated users to r | |
| 3524 | CVE-2025-54168 |
|
25.8th | 4.8 | A stored cross-site scripting (XSS) vulnerability in QuLog Center allows authenticated attackers wit | |
| 3525 | CVE-2025-14080 |
|
25.7th | 5.3 | This vulnerability allows unauthenticated attackers to modify any WordPress post by exploiting missi | |
| 3526 | CVE-2025-12348 |
|
25.7th | 5.3 | This vulnerability allows unauthenticated attackers to execute scheduled actions in the Icegram Expr | |
| 3527 | CVE-2025-12655 |
|
25.7th | 5.3 | This vulnerability allows unauthenticated attackers to write arbitrary JSON files to the server's pu | |
| 3528 | CVE-2025-67502 |
|
25.8th | 5.4 | This vulnerability allows attackers to craft malicious URLs that redirect authenticated Taguette use | |
| 3529 | CVE-2025-2848 |
|
25.7th | 6.3 | This vulnerability in Synology Mail Server allows authenticated remote attackers to modify non-sensi | |
| 3530 | CVE-2026-2062 |
|
25.6th | 5.3 | This CVE describes a null pointer dereference vulnerability in Open5GS PGW S5U Address Handler that | |
| 3531 | CVE-2025-12718 |
|
25.7th | 5.8 | The Quick Contact Form WordPress plugin contains an open mail relay vulnerability that allows unauth | |
| 3532 | CVE-2026-22239 |
|
25.7th | 5.3 | This vulnerability in BLUVOYIX allows unauthenticated attackers to send spam emails using the compan | |
| 3533 | CVE-2026-20812 |
|
25.7th | 6.5 | This vulnerability allows an authorized attacker to perform tampering attacks against Windows LDAP s | |
| 3534 | CVE-2025-11370 |
|
25.7th | 5.3 | This vulnerability allows unauthenticated attackers to modify pop-up display settings in WordPress s | |
| 3535 | CVE-2025-24751 |
|
25.5th | 4.3 | This CVE describes a missing authorization vulnerability in GoDaddy's CoBlocks WordPress plugin that | |
| 3536 | CVE-2025-24725 |
|
25.5th | 4.3 | This CVE describes a missing authorization vulnerability in the ThimPress Thim Elementor Kit WordPre | |
| 3537 | CVE-2025-24682 |
|
25.5th | 4.3 | This CVE describes a missing authorization vulnerability in the Super Block Slider WordPress plugin | |
| 3538 | CVE-2025-24679 |
|
25.5th | 4.3 | This CVE describes a missing authorization vulnerability in the WordPress Internal Links Manager plu | |
| 3539 | CVE-2023-37010 |
|
25.5th | 6.3 | This vulnerability allows remote attackers to cause denial of service by sending specially crafted A | |
| 3540 | CVE-2025-22721 |
|
25.5th | 4.3 | This CVE describes a missing authorization vulnerability in the ApplyOnline WordPress plugin that al | |
| 3541 | CVE-2024-13270 |
|
25.5th | 4.3 | This CVE describes an incorrect authorization vulnerability in Drupal's Freelinking module that allo | |
| 3542 | CVE-2025-0227 |
|
25.6th | 4.3 | This vulnerability allows remote attackers to read arbitrary files on Tsinghua Unigroup Electronic A | |
| 3543 | CVE-2025-0206 |
|
25.4th | 5.3 | CVE-2025-0206 is a critical improper access control vulnerability in code-projects Online Shoe Store | |
| 3544 | CVE-2025-25802 |
|
25.5th | 5.1 | SeaCMS v13.3 contains a remote code execution vulnerability in the admin_ip.php component that allow | |
| 3545 | CVE-2025-25796 |
|
25.5th | 5.1 | SeaCMS v13.3 contains a remote code execution vulnerability in admin_template.php that allows attack | |
| 3546 | CVE-2025-25793 |
|
25.5th | 5.1 | SeaCMS v13.3 contains a remote code execution vulnerability in the admin_notify.php component that a | |
| 3547 | CVE-2022-49475 |
|
25.6th | 5.5 | This CVE describes a null pointer dereference vulnerability in the Linux kernel's SPI-FSL-QSPI drive | |
| 3548 | CVE-2025-26983 |
|
25.5th | 4.3 | This CVE describes a Missing Authorization vulnerability in WPZOOM Recipe Card Blocks for WordPress | |
| 3549 | CVE-2025-21124 |
|
25.5th | 5.5 | Adobe InDesign has an out-of-bounds read vulnerability that could allow attackers to read sensitive | |
| 3550 | CVE-2025-30344 |
|
25.6th | 5.3 | This vulnerability allows attackers to determine whether specific usernames exist in OpenSlides syst |
What is EPSS?
The Exploit Prediction Scoring System (EPSS) is a data-driven model developed by FIRST.org that estimates the probability a CVE will be exploited in the wild within the next 30 days. Unlike CVSS which measures severity, EPSS measures likelihood of exploitation — making it ideal for prioritizing which vulnerabilities to patch first.
Why EPSS matters: With thousands of CVEs published monthly, not all vulnerabilities are equally dangerous. EPSS helps security teams focus on the CVEs most likely to be actively exploited, rather than patching solely by CVSS score. A critical CVSS 9.8 vulnerability with 0.1% EPSS may be less urgent than a high CVSS 7.5 with 90% EPSS.
Prioritize by Exploit Risk
Scan your servers and see which vulnerabilities have the highest EPSS scores. Focus on what attackers are actually targeting.
Start Monitoring Free