Most Exploitable CVEs - EPSS Rankings
CVEs ranked by EPSS (Exploit Prediction Scoring System) probability. Higher scores mean a greater likelihood of exploitation in the wild within the next 30 days.
| Rank | CVE ID | EPSS Score | Percentile | CVSS | Flags | Summary |
|---|---|---|---|---|---|---|
| 3751 | CVE-2025-14948 |
|
24.7th | 5.3 | The miniOrange OTP Verification and SMS Notification for WooCommerce WordPress plugin has an authori | |
| 3752 | CVE-2025-14460 |
|
24.7th | 5.3 | The Piraeus Bank WooCommerce Payment Gateway plugin for WordPress has an authorization bypass vulner | |
| 3753 | CVE-2025-13529 |
|
24.7th | 5.3 | The Unify WordPress plugin has an authorization bypass vulnerability that allows unauthenticated att | |
| 3754 | CVE-2025-15551 |
|
24.8th | 5.6 | This vulnerability allows attackers to execute arbitrary JavaScript code on affected TP-Link router | |
| 3755 | CVE-2026-23795 |
|
24.9th | 4.9 | This CVE describes an XXE vulnerability in Apache Syncope Console that allows administrators with Ke | |
| 3756 | CVE-2024-12102 |
|
24.6th | 4.3 | The Typer Core WordPress plugin has an information disclosure vulnerability that allows authenticate | |
| 3757 | CVE-2025-0729 |
|
24.7th | 4.3 | This CVE describes a clickjacking vulnerability in TP-Link TL-SG108E network switches. Attackers can | |
| 3758 | CVE-2024-22316 |
|
24.6th | 4.3 | CVE-2024-22316 is an improper access control vulnerability in IBM Sterling File Gateway that allows | |
| 3759 | CVE-2024-12529 |
|
24.7th | 6.4 | This stored XSS vulnerability in the brodos.net Onlineshop Plugin for WordPress allows authenticated | |
| 3760 | CVE-2024-12113 |
|
24.7th | 4.3 | This vulnerability allows authenticated WordPress users with Subscriber-level access or higher to de | |
| 3761 | CVE-2024-13721 |
|
24.7th | 6.4 | This stored XSS vulnerability in the Plethora Plugins Tabs + Accordions WordPress plugin allows auth | |
| 3762 | CVE-2024-12879 |
|
24.7th | 4.3 | The WPBot Pro WordPress Chatbot plugin has an authorization vulnerability that allows authenticated | |
| 3763 | CVE-2024-13392 |
|
24.7th | 6.4 | This vulnerability allows authenticated WordPress users with contributor-level access or higher to i | |
| 3764 | CVE-2024-13391 |
|
24.7th | 6.4 | This vulnerability allows authenticated attackers with contributor-level access or higher to inject | |
| 3765 | CVE-2024-12508 |
|
24.7th | 6.4 | This vulnerability allows authenticated WordPress users with contributor-level access or higher to i | |
| 3766 | CVE-2024-13387 |
|
24.7th | 6.4 | The WP Responsive Tabs WordPress plugin has a stored XSS vulnerability that allows authenticated att | |
| 3767 | CVE-2024-11851 |
|
24.7th | 4.3 | The NitroPack WordPress plugin has an authorization vulnerability that allows authenticated users wi | |
| 3768 | CVE-2024-12818 |
|
24.7th | 6.4 | The WP Smart TV WordPress plugin has a stored cross-site scripting vulnerability in its 'tv-video-pl | |
| 3769 | CVE-2024-55892 |
|
24.6th | 4.8 | This vulnerability in TYPO3's URI parsing component allows attackers to bypass host validation check | |
| 3770 | CVE-2025-23072 |
|
24.6th | 5.4 | This CVE describes a cross-site scripting (XSS) vulnerability in the MediaWiki RefreshSpecial extens | |
| 3771 | CVE-2023-42249 |
|
24.6th | 6.1 | This vulnerability allows attackers to inject malicious scripts into the Visual Access Manager web i | |
| 3772 | CVE-2023-42247 |
|
24.6th | 6.1 | This vulnerability allows attackers to inject malicious scripts into the Visual Access Manager web i | |
| 3773 | CVE-2023-42245 |
|
24.6th | 6.1 | CVE-2023-42245 is a cross-site scripting vulnerability in Selesta Visual Access Manager that allows | |
| 3774 | CVE-2023-42233 |
|
24.6th | 6.1 | Pat Infinite Solutions HelpdeskAdvanced versions up to 11.0.33 contain a cross-site scripting vulner | |
| 3775 | CVE-2024-12527 |
|
24.7th | 6.4 | The Perfect Portal Widgets WordPress plugin has a stored cross-site scripting vulnerability that all | |
| 3776 | CVE-2024-11386 |
|
24.7th | 6.4 | The GatorMail SmartForms WordPress plugin has a stored XSS vulnerability that allows authenticated a | |
| 3777 | CVE-2025-23110 |
|
24.6th | 6.1 | A reflected cross-site scripting (XSS) vulnerability in REDCap 14.9.6 allows attackers to inject mal | |
| 3778 | CVE-2025-23079 |
|
24.6th | 6.1 | This CVE describes a cross-site scripting (XSS) vulnerability in the MediaWiki ArticleFeedbackv5 ext | |
| 3779 | CVE-2024-13283 |
|
24.6th | 6.1 | This CVE describes a cross-site scripting (XSS) vulnerability in Drupal's Facets module that allows | |
| 3780 | CVE-2024-11830 |
|
24.6th | 6.4 | The PDF Flipbook, 3D Flipbook—DearFlip WordPress plugin has a stored cross-site scripting vulnerab | |
| 3781 | CVE-2024-12112 |
|
24.7th | 6.4 | This vulnerability allows authenticated WordPress users with Subscriber-level access or higher to in | |
| 3782 | CVE-2024-12131 |
|
24.7th | 4.3 | This vulnerability allows authenticated WordPress users with Subscriber-level access or higher to su | |
| 3783 | CVE-2024-52891 |
|
24.7th | 5.4 | This vulnerability in IBM Concert Software allows authenticated users to inject malicious content in | |
| 3784 | CVE-2024-11826 |
|
24.7th | 6.4 | This vulnerability allows authenticated attackers with contributor-level access or higher to inject | |
| 3785 | CVE-2024-12516 |
|
24.7th | 6.4 | This stored XSS vulnerability in the WordPress Coupon Plugin allows authenticated attackers with Con | |
| 3786 | CVE-2024-12495 |
|
24.7th | 6.4 | This stored XSS vulnerability in Bootstrap Blocks for WP Editor allows authenticated attackers with | |
| 3787 | CVE-2024-11764 |
|
24.7th | 6.4 | The Solar Wizard Lite WordPress plugin has a stored XSS vulnerability that allows authenticated atta | |
| 3788 | CVE-2024-11749 |
|
24.7th | 6.4 | The App Embed WordPress plugin has a stored cross-site scripting vulnerability that allows authentic | |
| 3789 | CVE-2024-12457 |
|
24.7th | 6.4 | This stored XSS vulnerability in the Chat Support for Viber WordPress plugin allows authenticated at | |
| 3790 | CVE-2024-11338 |
|
24.7th | 6.4 | This vulnerability allows authenticated WordPress users with Subscriber-level access or higher to in | |
| 3791 | CVE-2024-12592 |
|
24.7th | 6.4 | The Sellsy WordPress plugin has a stored XSS vulnerability that allows authenticated attackers with | |
| 3792 | CVE-2025-1091 |
|
24.6th | 4.3 | This CVE describes a broken authorization vulnerability where authenticated users can download IOA s | |
| 3793 | CVE-2025-1618 |
|
24.6th | 4.3 | This vulnerability in vTiger CRM allows attackers to inject malicious scripts via the _operation par | |
| 3794 | CVE-2025-23020 |
|
24.7th | 5.3 | A hash collision vulnerability in Kwik's connection management hash table allows remote attackers to | |
| 3795 | CVE-2024-52882 |
|
24.6th | 6.1 | This cross-site scripting (XSS) vulnerability in AudioCodes One Voice Operations Center allows attac | |
| 3796 | CVE-2025-31683 |
|
24.6th | 6.8 | This CSRF vulnerability in Drupal Google Tag allows attackers to trick authenticated administrators | |
| 3797 | CVE-2025-20228 |
|
24.6th | 6.5 | A Cross-Site Request Forgery (CSRF) vulnerability in Splunk Enterprise and Splunk Cloud Platform all | |
| 3798 | CVE-2024-53679 |
|
24.6th | 5.4 | This is a stored cross-site scripting (XSS) vulnerability in Apache VCL's User Lookup form that allo | |
| 3799 | CVE-2025-23188 |
|
24.7th | 4.3 | An authenticated low-privilege user can exploit a missing authorization check in the IBS module of F | |
| 3800 | CVE-2024-54463 |
|
24.6th | 5.5 | This macOS vulnerability allows malicious applications to access removable storage devices (like USB |
What is EPSS?
The Exploit Prediction Scoring System (EPSS) is a data-driven model developed by FIRST.org that estimates the probability a CVE will be exploited in the wild within the next 30 days. Unlike CVSS which measures severity, EPSS measures likelihood of exploitation — making it ideal for prioritizing which vulnerabilities to patch first.
Why EPSS matters: With thousands of CVEs published monthly, not all vulnerabilities are equally dangerous. EPSS helps security teams focus on the CVEs most likely to be actively exploited, rather than patching solely by CVSS score. A critical CVSS 9.8 vulnerability with 0.1% EPSS may be less urgent than a high CVSS 7.5 with 90% EPSS.
Prioritize by Exploit Risk
Scan your servers and see which vulnerabilities have the highest EPSS scores. Focus on what attackers are actually targeting.
Start Monitoring Free