Most Exploitable CVEs - EPSS Rankings
CVEs ranked by EPSS (Exploit Prediction Scoring System) probability. Higher scores mean a greater likelihood of exploitation in the wild within the next 30 days.
| Rank | CVE ID | EPSS Score | Percentile | CVSS | Flags | Summary |
|---|---|---|---|---|---|---|
| 3951 | CVE-2025-10847 |
|
53.1th | N/A | DX Unified Infrastructure Management (Nimsoft/UIM) has an improper ACL handling vulnerability in its | |
| 3952 | CVE-2025-14659 |
|
53.1th | 8.8 | This vulnerability allows remote attackers to execute arbitrary commands on D-Link DIR-860LB1 and DI | |
| 3953 | CVE-2025-59099 |
|
53.1th | N/A | This path traversal vulnerability in CompactWebServer allows unauthenticated attackers to read arbit | |
| 3954 | CVE-2024-41339 |
|
52.9th | 8.8 | This vulnerability allows attackers to upload malicious kernel modules through the CGI configuration | |
| 3955 | CVE-2025-27105 |
|
53th | 9.1 | This vulnerability in Vyper smart contract language allows out-of-bounds array access when using aug | |
| 3956 | CVE-2024-50954 |
|
52.9th | 7.5 | A vulnerability in XINJE XL5E-16T and XD5E-24R-E programmable logic controllers allows attackers to | |
| 3957 | CVE-2024-12712 |
|
52.9th | 5.3 | This vulnerability allows unauthenticated attackers to modify order statuses in WordPress sites usin | |
| 3958 | CVE-2025-24499 |
|
52.9th | 7.2 | This vulnerability in Siemens SCALANCE industrial wireless devices allows authenticated remote attac | |
| 3959 | CVE-2025-39565 |
|
52.9th | 6.6 | A PHP object injection vulnerability in Melapress Login Security WordPress plugin allows attackers t | |
| 3960 | CVE-2024-41794 |
|
52.9th | 10.0 | SENTRON 7KT PAC1260 Data Manager devices contain hardcoded root credentials that allow unauthenticat | |
| 3961 | CVE-2024-47261 |
|
52.9th | 4.3 | This vulnerability allows attackers to upload files via the VAPIX API uploadoverlayimage.cgi endpoin | |
| 3962 | CVE-2025-41407 |
|
52.9th | 8.3 | This SQL injection vulnerability in ManageEngine ADAudit Plus allows attackers to execute arbitrary | |
| 3963 | CVE-2025-20234 |
|
52.9th | 5.3 | A memory overread vulnerability in ClamAV's Universal Disk Format (UDF) processing allows unauthenti | |
| 3964 | CVE-2025-5629 |
|
52.9th | 8.8 | A critical buffer overflow vulnerability in Tenda AC10 routers allows remote attackers to execute ar | |
| 3965 | CVE-2025-34520 |
|
52.9th | 9.8 | An authentication bypass vulnerability in Arcserve Unified Data Protection (UDP) allows unauthentica | |
| 3966 | CVE-2025-11073 |
|
52.9th | 4.7 | This vulnerability allows remote attackers to execute arbitrary commands on Keyfactor RG-EW5100BE de | |
| 3967 | CVE-2025-12486 |
|
52.9th | 8.8 | This is a cross-site scripting (XSS) vulnerability in Heimdall Data Database Proxy that allows remot | |
| 3968 | CVE-2022-50595 |
|
52.9th | 7.2 | This vulnerability allows remote attackers to bypass authentication and execute SQL injection via th | |
| 3969 | CVE-2022-50592 |
|
52.9th | 7.2 | This vulnerability allows remote attackers to bypass authentication and execute SQL injection agains | |
| 3970 | CVE-2023-54335 |
|
52.9th | 9.8 | eXtplorer 2.1.14 contains an authentication bypass vulnerability that allows attackers to login with | |
| 3971 | CVE-2025-14891 |
|
52.8th | 6.4 | This stored XSS vulnerability in the Customer Reviews for WooCommerce WordPress plugin allows attack | |
| 3972 | CVE-2025-0574 |
|
52.8th | 7.5 | CVE-2025-0574 is a memory corruption vulnerability in Sante PACS Server's URL parsing that allows un | |
| 3973 | CVE-2024-54507 |
|
52.8th | 5.5 | A type confusion vulnerability in Apple operating systems allows attackers with user privileges to r | |
| 3974 | CVE-2024-56921 |
|
52.8th | 7.5 | This vulnerability in Open5gs AMF allows remote attackers to cause a denial of service by sending sp | |
| 3975 | CVE-2025-25612 |
|
52.8th | 7.1 | This vulnerability allows attackers to inject malicious JavaScript into the 'Time Range Name' field | |
| 3976 | CVE-2025-24078 |
|
52.8th | 7.0 | A use-after-free vulnerability in Microsoft Office Word allows attackers to execute arbitrary code o | |
| 3977 | CVE-2025-27615 |
|
52.8th | 8.2 | The umatiGateway software exposes its web interface publicly by default in Docker deployments, allow | |
| 3978 | CVE-2025-30692 |
|
52.8th | 6.5 | This vulnerability in Oracle iSupplier Portal allows authenticated attackers with low privileges to | |
| 3979 | CVE-2025-5160 |
|
52.8th | 4.3 | A path traversal vulnerability in H3C SecCenter SMP-E1114P02 allows attackers to access arbitrary fi | |
| 3980 | CVE-2025-6104 |
|
52.8th | 8.8 | This critical vulnerability allows remote attackers to execute arbitrary operating system commands o | |
| 3981 | CVE-2025-24028 |
|
52.8th | 7.8 | This is a cross-site scripting (XSS) vulnerability in Joplin's Rich Text Editor caused by difference | |
| 3982 | CVE-2025-2973 |
|
52.7th | 6.3 | This critical vulnerability in College Management System 1.0 allows remote attackers to upload malic | |
| 3983 | CVE-2025-26733 |
|
52.7th | 8.2 | This CVE describes a Missing Authorization vulnerability in the Shinetheme Traveler WordPress theme | |
| 3984 | CVE-2025-39554 |
|
52.7th | 6.5 | This CVE describes a Missing Authorization vulnerability in the RelyWP AI Text to Speech WordPress p | |
| 3985 | CVE-2025-24581 |
|
52.7th | 6.5 | This CVE describes a Missing Authorization vulnerability in the Themefic Instantio WordPress plugin | |
| 3986 | CVE-2025-23958 |
|
52.7th | 6.5 | This CVE describes a missing authorization vulnerability in the FADI MED Editor Wysiwyg Background C | |
| 3987 | CVE-2025-23773 |
|
52.7th | 6.5 | This CVE describes a Missing Authorization vulnerability in the WordPress 'Delete All Posts' plugin | |
| 3988 | CVE-2025-32243 |
|
52.7th | 6.5 | This CVE describes a Missing Authorization vulnerability in the WordPress Internal Link Optimiser pl | |
| 3989 | CVE-2025-32240 |
|
52.7th | 6.5 | This CVE describes a missing authorization vulnerability in the WordPress Site Notify plugin that al | |
| 3990 | CVE-2025-3430 |
|
52.8th | 4.9 | The 3DPrint Lite WordPress plugin contains an SQL injection vulnerability in the 'printer_text' para | |
| 3991 | CVE-2025-3428 |
|
52.8th | 4.9 | The 3DPrint Lite WordPress plugin contains an SQL injection vulnerability in the 'coating_text' para | |
| 3992 | CVE-2025-31381 |
|
52.7th | 6.5 | This CVE describes a Missing Authorization vulnerability in the Shiptrack Booking Calendar and Notif | |
| 3993 | CVE-2025-22285 |
|
52.7th | 6.5 | This CVE describes a Missing Authorization vulnerability in Eniture Technology's Pallet Packaging fo | |
| 3994 | CVE-2025-31858 |
|
52.7th | 6.5 | CVE-2025-31858 is a missing authorization vulnerability in the Local Magic WordPress plugin that all | |
| 3995 | CVE-2025-31768 |
|
52.7th | 6.5 | This CVE describes a Missing Authorization vulnerability in the OTWthemes Widget Manager Light WordP | |
| 3996 | CVE-2025-31736 |
|
52.7th | 6.5 | CVE-2025-31736 is a missing authorization vulnerability in the richtexteditor WordPress plugin that | |
| 3997 | CVE-2025-30916 |
|
52.7th | 6.5 | This CVE describes a Missing Authorization vulnerability in the Residential Address Detection WordPr | |
| 3998 | CVE-2024-12410 |
|
52.8th | 4.9 | This SQL injection vulnerability in the Front End Users WordPress plugin allows unauthenticated atta | |
| 3999 | CVE-2025-31780 |
|
52.7th | 6.5 | This CVE describes a Missing Authorization vulnerability in the WordPress Append Content plugin that | |
| 4000 | CVE-2025-47492 |
|
52.7th | 8.6 | This path traversal vulnerability in the Drag and Drop File Upload for Elementor Forms WordPress plu |
What is EPSS?
The Exploit Prediction Scoring System (EPSS) is a data-driven model developed by FIRST.org that estimates the probability a CVE will be exploited in the wild within the next 30 days. Unlike CVSS which measures severity, EPSS measures likelihood of exploitation — making it ideal for prioritizing which vulnerabilities to patch first.
Why EPSS matters: With thousands of CVEs published monthly, not all vulnerabilities are equally dangerous. EPSS helps security teams focus on the CVEs most likely to be actively exploited, rather than patching solely by CVSS score. A critical CVSS 9.8 vulnerability with 0.1% EPSS may be less urgent than a high CVSS 7.5 with 90% EPSS.
Prioritize by Exploit Risk
Scan your servers and see which vulnerabilities have the highest EPSS scores. Focus on what attackers are actually targeting.
Start Monitoring Free