Most Exploitable CVEs - EPSS Rankings
CVEs ranked by EPSS (Exploit Prediction Scoring System) probability. Higher scores mean a greater likelihood of exploitation in the wild within the next 30 days.
| Rank | CVE ID | EPSS Score | Percentile | CVSS | Flags | Summary |
|---|---|---|---|---|---|---|
| 3951 | CVE-2025-54500 |
|
24.2th | 5.3 | This CVE describes an HTTP/2 implementation flaw that allows attackers to send malformed HTTP/2 cont | |
| 3952 | CVE-2022-50941 |
|
24.3th | 6.4 | BootCommerce 3.2.1 contains persistent cross-site scripting (XSS) vulnerabilities in guest order che | |
| 3953 | CVE-2022-50940 |
|
24.3th | 6.4 | Knap Advanced PHP Login 3.1.3 contains a persistent cross-site scripting (XSS) vulnerability in the | |
| 3954 | CVE-2022-50797 |
|
24.3th | 6.4 | The Stripe Green Downloads WordPress plugin version 2.03 contains a persistent cross-site scripting | |
| 3955 | CVE-2025-0439 |
|
24.1th | 6.5 | This vulnerability in Google Chrome allows attackers to perform UI spoofing by tricking users into s | |
| 3956 | CVE-2025-27294 |
|
24.1th | 4.8 | A missing authorization vulnerability in the WP-Asambleas WordPress plugin allows attackers to explo | |
| 3957 | CVE-2024-55159 |
|
24.1th | 4.2 | GFast versions 2.0 through 3.2 contain a SQL injection vulnerability in the login log listing endpoi | |
| 3958 | CVE-2026-1754 |
|
24th | 6.1 | The personal-authors-category WordPress plugin contains a reflected cross-site scripting (XSS) vulne | |
| 3959 | CVE-2025-22701 |
|
24.1th | 5.4 | This Server-Side Request Forgery (SSRF) vulnerability in the Traveler Layout Essential For Elementor | |
| 3960 | CVE-2025-2831 |
|
23.9th | 6.3 | This critical SQL injection vulnerability in the mingyuefusu library management system allows remote | |
| 3961 | CVE-2024-13731 |
|
23.9th | 6.4 | This vulnerability allows authenticated WordPress users with contributor-level access or higher to i | |
| 3962 | CVE-2025-27612 |
|
24th | 5.9 | This vulnerability in libcontainer allows tenant containers to inherit capabilities from the main co | |
| 3963 | CVE-2024-22340 |
|
23.9th | 6.5 | This vulnerability in IBM Common Cryptographic Architecture allows remote attackers to perform timin | |
| 3964 | CVE-2025-3643 |
|
23.9th | 5.4 | A reflected cross-site scripting (XSS) vulnerability exists in Moodle's policy tool where insufficie | |
| 3965 | CVE-2025-47748 |
|
24th | 5.3 | Netwrix Directory Manager versions 11.0.0.0 and earlier, plus versions after 11.1.25134.03, contain | |
| 3966 | CVE-2024-1663 |
|
24.1th | 4.8 | This vulnerability in the Ultimate Noindex Nofollow Tool II WordPress plugin allows administrators t | |
| 3967 | CVE-2023-5932 |
|
24.1th | 4.8 | This vulnerability allows attackers to inject malicious scripts via unsanitized parameters in the Tr | |
| 3968 | CVE-2025-24785 |
|
24.1th | 4.3 | This vulnerability in iTop 3.2.0 allows attackers to send specially crafted URLs that trigger PHP er | |
| 3969 | CVE-2025-40598 |
|
24th | 6.1 | A reflected cross-site scripting (XSS) vulnerability in the SMA100 series web interface allows remot | |
| 3970 | CVE-2025-7060 |
|
24th | 4.1 | Monitorr versions up to 1.7.6m contain an improper input validation vulnerability in the installer c | |
| 3971 | CVE-2025-8729 |
|
23.9th | 6.3 | This is a critical path traversal vulnerability in MigoXLab LMeterX 1.2.0 that allows attackers to a | |
| 3972 | CVE-2024-55401 |
|
23.9th | 6.5 | This directory traversal vulnerability in 4C Strategies Exonaut allows attackers to access files out | |
| 3973 | CVE-2025-46152 |
|
24.1th | 5.3 | A vulnerability in PyTorch's bitwise_right_shift function produces incorrect output when given out-o | |
| 3974 | CVE-2024-4598 |
|
23.9th | 6.5 | This CVE describes an information disclosure vulnerability in WSO2 products where authenticated user | |
| 3975 | CVE-2025-12284 |
|
24th | 6.1 | This vulnerability in BLU-IC2 and BLU-IC4 web interfaces allows attackers to submit malicious input | |
| 3976 | CVE-2025-12001 |
|
24th | 6.1 | This vulnerability allows attackers to inject malicious scripts into application manifests, which co | |
| 3977 | CVE-2025-11470 |
|
24th | 4.7 | This vulnerability allows attackers to upload arbitrary files to the Hotel and Lodge Management Syst | |
| 3978 | CVE-2025-64169 |
|
23.9th | 4.9 | This vulnerability allows a compromised Wazuh agent to crash the analysisd service on the Wazuh mana | |
| 3979 | CVE-2025-12969 |
|
24th | 6.5 | This vulnerability allows remote attackers to bypass authentication in Fluent Bit's in_forward input | |
| 3980 | CVE-2025-13574 |
|
24.1th | 4.7 | This vulnerability allows remote attackers to upload arbitrary files to the Online Bidding System 1. | |
| 3981 | CVE-2025-67653 |
|
23.9th | 4.3 | Advantech WebAccess/SCADA is vulnerable to directory traversal (CWE-22), allowing attackers to check | |
| 3982 | CVE-2025-12689 |
|
24th | 6.5 | This vulnerability allows attackers to crash the Calls plugin in Mattermost by sending malformed Web | |
| 3983 | CVE-2025-15529 |
|
24th | 5.3 | A denial-of-service vulnerability exists in Open5GS's SGWC component where remote attackers can mani | |
| 3984 | CVE-2025-15528 |
|
24th | 5.3 | A denial-of-service vulnerability exists in Open5GS's GTPv2 Bearer Response Handler component. Attac | |
| 3985 | CVE-2026-22912 |
|
24th | 4.3 | This vulnerability allows attackers to redirect authenticated users to malicious websites through im | |
| 3986 | CVE-2026-24766 |
|
24th | 4.9 | An authenticated user with org-level-creator permissions in NocoDB can exploit prototype pollution i | |
| 3987 | CVE-2025-22919 |
|
23.8th | 6.5 | This CVE describes a reachable assertion vulnerability in FFmpeg that allows attackers to cause a De | |
| 3988 | CVE-2024-55604 |
|
23.7th | 4.3 | Appsmith versions before 1.51 allow users with 'App Viewer' permissions to list datasources in works | |
| 3989 | CVE-2024-10723 |
|
23.9th | 5.4 | A stored cross-site scripting (XSS) vulnerability in phpipam/phpipam version 1.5.2 allows attackers | |
| 3990 | CVE-2024-10721 |
|
23.9th | 5.4 | A stored cross-site scripting (XSS) vulnerability in phpipam/phpipam version 1.5.2 allows attackers | |
| 3991 | CVE-2025-2393 |
|
23.9th | 4.7 | This critical vulnerability in code-projects Online Class and Exam Scheduling System 1.0 allows remo | |
| 3992 | CVE-2024-54469 |
|
23.8th | 5.5 | This CVE describes an information disclosure vulnerability in Apple operating systems where a local | |
| 3993 | CVE-2023-43052 |
|
23.7th | 5.3 | IBM Control Center versions 6.2.1 through 6.3.1 are vulnerable to server-side request forgery (SSRF) | |
| 3994 | CVE-2025-24348 |
|
23.7th | 5.4 | A vulnerability in ctrlX OS allows authenticated low-privileged attackers to manipulate wireless net | |
| 3995 | CVE-2025-3975 |
|
23.8th | 5.3 | This vulnerability in ScriptAndTools eCommerce-website-in-PHP 3.0 allows remote attackers to access | |
| 3996 | CVE-2025-32979 |
|
23.9th | 6.5 | This vulnerability in NETSCOUT nGeniusONE allows authenticated users to create arbitrary files on th | |
| 3997 | CVE-2025-22106 |
|
23.7th | 5.5 | This vulnerability in the Linux kernel's vmxnet3 driver causes a kernel warning when the driver rese | |
| 3998 | CVE-2025-22103 |
|
23.7th | 5.5 | A race condition in the Linux kernel's networking subsystem causes a NULL pointer dereference when d | |
| 3999 | CVE-2025-22093 |
|
23.8th | 5.5 | A NULL pointer dereference vulnerability in the Linux kernel's AMD display driver allows local attac | |
| 4000 | CVE-2025-22049 |
|
23.8th | 5.5 | This CVE addresses a DMA (Direct Memory Access) alignment vulnerability in the Linux kernel for Loon |
What is EPSS?
The Exploit Prediction Scoring System (EPSS) is a data-driven model developed by FIRST.org that estimates the probability a CVE will be exploited in the wild within the next 30 days. Unlike CVSS which measures severity, EPSS measures likelihood of exploitation — making it ideal for prioritizing which vulnerabilities to patch first.
Why EPSS matters: With thousands of CVEs published monthly, not all vulnerabilities are equally dangerous. EPSS helps security teams focus on the CVEs most likely to be actively exploited, rather than patching solely by CVSS score. A critical CVSS 9.8 vulnerability with 0.1% EPSS may be less urgent than a high CVSS 7.5 with 90% EPSS.
Prioritize by Exploit Risk
Scan your servers and see which vulnerabilities have the highest EPSS scores. Focus on what attackers are actually targeting.
Start Monitoring Free