Most Exploitable CVEs - EPSS Rankings

CVEs ranked by EPSS (Exploit Prediction Scoring System) probability. Higher scores mean a greater likelihood of exploitation in the wild within the next 30 days.

164
EPSS > 50%
156
CISA KEV Listed
35,468
CVEs with EPSS
0.7%
Avg EPSS Score
All Critical High Medium Low
Rank CVE ID EPSS Score Percentile CVSS Flags Summary
3751 CVE-2025-14948
0.09%
24.7th 5.3 The miniOrange OTP Verification and SMS Notification for WooCommerce WordPress plugin has an authori
3752 CVE-2025-14460
0.09%
24.7th 5.3 The Piraeus Bank WooCommerce Payment Gateway plugin for WordPress has an authorization bypass vulner
3753 CVE-2025-13529
0.09%
24.7th 5.3 The Unify WordPress plugin has an authorization bypass vulnerability that allows unauthenticated att
3754 CVE-2025-15551
0.09%
24.8th 5.6 This vulnerability allows attackers to execute arbitrary JavaScript code on affected TP-Link router
3755 CVE-2026-23795
0.09%
24.9th 4.9 This CVE describes an XXE vulnerability in Apache Syncope Console that allows administrators with Ke
3756 CVE-2024-12102
0.09%
24.6th 4.3 The Typer Core WordPress plugin has an information disclosure vulnerability that allows authenticate
3757 CVE-2025-0729
0.09%
24.7th 4.3 This CVE describes a clickjacking vulnerability in TP-Link TL-SG108E network switches. Attackers can
3758 CVE-2024-22316
0.09%
24.6th 4.3 CVE-2024-22316 is an improper access control vulnerability in IBM Sterling File Gateway that allows
3759 CVE-2024-12529
0.09%
24.7th 6.4 This stored XSS vulnerability in the brodos.net Onlineshop Plugin for WordPress allows authenticated
3760 CVE-2024-12113
0.09%
24.7th 4.3 This vulnerability allows authenticated WordPress users with Subscriber-level access or higher to de
3761 CVE-2024-13721
0.09%
24.7th 6.4 This stored XSS vulnerability in the Plethora Plugins Tabs + Accordions WordPress plugin allows auth
3762 CVE-2024-12879
0.09%
24.7th 4.3 The WPBot Pro WordPress Chatbot plugin has an authorization vulnerability that allows authenticated
3763 CVE-2024-13392
0.09%
24.7th 6.4 This vulnerability allows authenticated WordPress users with contributor-level access or higher to i
3764 CVE-2024-13391
0.09%
24.7th 6.4 This vulnerability allows authenticated attackers with contributor-level access or higher to inject
3765 CVE-2024-12508
0.09%
24.7th 6.4 This vulnerability allows authenticated WordPress users with contributor-level access or higher to i
3766 CVE-2024-13387
0.09%
24.7th 6.4 The WP Responsive Tabs WordPress plugin has a stored XSS vulnerability that allows authenticated att
3767 CVE-2024-11851
0.09%
24.7th 4.3 The NitroPack WordPress plugin has an authorization vulnerability that allows authenticated users wi
3768 CVE-2024-12818
0.09%
24.7th 6.4 The WP Smart TV WordPress plugin has a stored cross-site scripting vulnerability in its 'tv-video-pl
3769 CVE-2024-55892
0.09%
24.6th 4.8 This vulnerability in TYPO3's URI parsing component allows attackers to bypass host validation check
3770 CVE-2025-23072
0.09%
24.6th 5.4 This CVE describes a cross-site scripting (XSS) vulnerability in the MediaWiki RefreshSpecial extens
3771 CVE-2023-42249
0.09%
24.6th 6.1 This vulnerability allows attackers to inject malicious scripts into the Visual Access Manager web i
3772 CVE-2023-42247
0.09%
24.6th 6.1 This vulnerability allows attackers to inject malicious scripts into the Visual Access Manager web i
3773 CVE-2023-42245
0.09%
24.6th 6.1 CVE-2023-42245 is a cross-site scripting vulnerability in Selesta Visual Access Manager that allows
3774 CVE-2023-42233
0.09%
24.6th 6.1 Pat Infinite Solutions HelpdeskAdvanced versions up to 11.0.33 contain a cross-site scripting vulner
3775 CVE-2024-12527
0.09%
24.7th 6.4 The Perfect Portal Widgets WordPress plugin has a stored cross-site scripting vulnerability that all
3776 CVE-2024-11386
0.09%
24.7th 6.4 The GatorMail SmartForms WordPress plugin has a stored XSS vulnerability that allows authenticated a
3777 CVE-2025-23110
0.09%
24.6th 6.1 A reflected cross-site scripting (XSS) vulnerability in REDCap 14.9.6 allows attackers to inject mal
3778 CVE-2025-23079
0.09%
24.6th 6.1 This CVE describes a cross-site scripting (XSS) vulnerability in the MediaWiki ArticleFeedbackv5 ext
3779 CVE-2024-13283
0.09%
24.6th 6.1 This CVE describes a cross-site scripting (XSS) vulnerability in Drupal's Facets module that allows
3780 CVE-2024-11830
0.09%
24.6th 6.4 The PDF Flipbook, 3D Flipbook—DearFlip WordPress plugin has a stored cross-site scripting vulnerab
3781 CVE-2024-12112
0.09%
24.7th 6.4 This vulnerability allows authenticated WordPress users with Subscriber-level access or higher to in
3782 CVE-2024-12131
0.09%
24.7th 4.3 This vulnerability allows authenticated WordPress users with Subscriber-level access or higher to su
3783 CVE-2024-52891
0.09%
24.7th 5.4 This vulnerability in IBM Concert Software allows authenticated users to inject malicious content in
3784 CVE-2024-11826
0.09%
24.7th 6.4 This vulnerability allows authenticated attackers with contributor-level access or higher to inject
3785 CVE-2024-12516
0.09%
24.7th 6.4 This stored XSS vulnerability in the WordPress Coupon Plugin allows authenticated attackers with Con
3786 CVE-2024-12495
0.09%
24.7th 6.4 This stored XSS vulnerability in Bootstrap Blocks for WP Editor allows authenticated attackers with
3787 CVE-2024-11764
0.09%
24.7th 6.4 The Solar Wizard Lite WordPress plugin has a stored XSS vulnerability that allows authenticated atta
3788 CVE-2024-11749
0.09%
24.7th 6.4 The App Embed WordPress plugin has a stored cross-site scripting vulnerability that allows authentic
3789 CVE-2024-12457
0.09%
24.7th 6.4 This stored XSS vulnerability in the Chat Support for Viber WordPress plugin allows authenticated at
3790 CVE-2024-11338
0.09%
24.7th 6.4 This vulnerability allows authenticated WordPress users with Subscriber-level access or higher to in
3791 CVE-2024-12592
0.09%
24.7th 6.4 The Sellsy WordPress plugin has a stored XSS vulnerability that allows authenticated attackers with
3792 CVE-2025-1091
0.09%
24.6th 4.3 This CVE describes a broken authorization vulnerability where authenticated users can download IOA s
3793 CVE-2025-1618
0.09%
24.6th 4.3 This vulnerability in vTiger CRM allows attackers to inject malicious scripts via the _operation par
3794 CVE-2025-23020
0.09%
24.7th 5.3 A hash collision vulnerability in Kwik's connection management hash table allows remote attackers to
3795 CVE-2024-52882
0.09%
24.6th 6.1 This cross-site scripting (XSS) vulnerability in AudioCodes One Voice Operations Center allows attac
3796 CVE-2025-31683
0.09%
24.6th 6.8 This CSRF vulnerability in Drupal Google Tag allows attackers to trick authenticated administrators
3797 CVE-2025-20228
0.09%
24.6th 6.5 A Cross-Site Request Forgery (CSRF) vulnerability in Splunk Enterprise and Splunk Cloud Platform all
3798 CVE-2024-53679
0.09%
24.6th 5.4 This is a stored cross-site scripting (XSS) vulnerability in Apache VCL's User Lookup form that allo
3799 CVE-2025-23188
0.09%
24.7th 4.3 An authenticated low-privilege user can exploit a missing authorization check in the IBS module of F
3800 CVE-2024-54463
0.09%
24.6th 5.5 This macOS vulnerability allows malicious applications to access removable storage devices (like USB

What is EPSS?

The Exploit Prediction Scoring System (EPSS) is a data-driven model developed by FIRST.org that estimates the probability a CVE will be exploited in the wild within the next 30 days. Unlike CVSS which measures severity, EPSS measures likelihood of exploitation — making it ideal for prioritizing which vulnerabilities to patch first.

Why EPSS matters: With thousands of CVEs published monthly, not all vulnerabilities are equally dangerous. EPSS helps security teams focus on the CVEs most likely to be actively exploited, rather than patching solely by CVSS score. A critical CVSS 9.8 vulnerability with 0.1% EPSS may be less urgent than a high CVSS 7.5 with 90% EPSS.

Prioritize by Exploit Risk

Scan your servers and see which vulnerabilities have the highest EPSS scores. Focus on what attackers are actually targeting.

Start Monitoring Free