Most Exploitable CVEs - EPSS Rankings
CVEs ranked by EPSS (Exploit Prediction Scoring System) probability. Higher scores mean a greater likelihood of exploitation in the wild within the next 30 days.
| Rank | CVE ID | EPSS Score | Percentile | CVSS | Flags | Summary |
|---|---|---|---|---|---|---|
| 4051 | CVE-2025-7366 |
|
52.3th | 7.3 | This vulnerability allows unauthenticated attackers to execute arbitrary WordPress shortcodes in the | |
| 4052 | CVE-2025-63800 |
|
52.3th | 7.5 | This vulnerability allows authenticated users to set their account password to an empty string via t | |
| 4053 | CVE-2025-13087 |
|
52.3th | 6.2 | This vulnerability allows remote attackers with administrative access to execute arbitrary commands | |
| 4054 | CVE-2025-11787 |
|
52.3th | 8.8 | This CVE describes a command injection vulnerability in Circutor SGE-PLC1000/SGE-PLC50 devices that | |
| 4055 | CVE-2024-24423 |
|
52.2th | 7.5 | A buffer overflow vulnerability in Magma's decode_esm_message_container function allows attackers to | |
| 4056 | CVE-2024-24419 |
|
52.2th | 7.5 | A buffer overflow vulnerability in Magma's decode_traffic_flow_template_packet_filter function allow | |
| 4057 | CVE-2024-24418 |
|
52.2th | 7.5 | This vulnerability is a buffer overflow in the decode_pdn_address function of the Linux Foundation M | |
| 4058 | CVE-2024-24417 |
|
52.2th | 7.5 | A buffer overflow vulnerability in Magma's decode_protocol_configuration_options function allows att | |
| 4059 | CVE-2024-24416 |
|
52.2th | 7.5 | A buffer overflow vulnerability in Magma's decode_access_point_name_ie function allows attackers to | |
| 4060 | CVE-2024-12104 |
|
52.2th | 5.3 | The Atarim WordPress plugin has a vulnerability that allows unauthenticated attackers to delete proj | |
| 4061 | CVE-2024-46210 |
|
52.2th | 7.2 | An arbitrary file upload vulnerability in Redaxo CMS v5.17.1 allows attackers to upload malicious fi | |
| 4062 | CVE-2025-26819 |
|
52.3th | 8.6 | Monero versions before commit ec74ff4 lack HTTP server connection response limits, allowing attacker | |
| 4063 | CVE-2025-1707 |
|
52.2th | 8.8 | The Review Schema WordPress plugin has a Local File Inclusion vulnerability that allows authenticate | |
| 4064 | CVE-2025-26630 |
|
52.3th | 7.8 | A use-after-free vulnerability in Microsoft Office Access allows attackers to execute arbitrary code | |
| 4065 | CVE-2025-24077 |
|
52.3th | 7.8 | A use-after-free vulnerability in Microsoft Office Word allows attackers to execute arbitrary code o | |
| 4066 | CVE-2025-24075 |
|
52.3th | 7.8 | A stack-based buffer overflow vulnerability in Microsoft Office Excel allows attackers to execute ar | |
| 4067 | CVE-2025-3563 |
|
52.2th | 4.7 | This critical vulnerability in WuzhiCMS 4.1 allows remote attackers to execute arbitrary code throug | |
| 4068 | CVE-2025-43860 |
|
52.2th | 7.6 | OpenEMR versions before 7.0.3.4 have a stored XSS vulnerability where authenticated users with patie | |
| 4069 | CVE-2025-56752 |
|
52.3th | 9.4 | This critical authentication bypass vulnerability in Ruijie RG-ES series switches allows remote atta | |
| 4070 | CVE-2023-7322 |
|
52.2th | 8.1 | Nagios Log Server versions before 2024R1 have an incorrect authorization vulnerability where authent | |
| 4071 | CVE-2025-28357 |
|
52.2th | 8.8 | A CRLF injection vulnerability in Neto CMS allows attackers to inject malicious HTTP headers through | |
| 4072 | CVE-2025-13810 |
|
52.2th | 5.3 | A path traversal vulnerability in jsnjfz WebStack-Guns 1.0 allows remote attackers to read arbitrary | |
| 4073 | CVE-2025-69766 |
|
52.2th | 9.8 | This vulnerability allows remote attackers to execute arbitrary code on Tenda AX3 routers by exploit | |
| 4074 | CVE-2025-69763 |
|
52.2th | 9.8 | This vulnerability allows remote attackers to execute arbitrary code on Tenda AX3 routers by exploit | |
| 4075 | CVE-2025-69762 |
|
52.2th | 9.8 | This vulnerability allows remote attackers to execute arbitrary code on Tenda AX3 routers by exploit | |
| 4076 | CVE-2024-57581 |
|
52.1th | 9.8 | This vulnerability allows remote attackers to execute arbitrary code on Tenda AC18 routers by exploi | |
| 4077 | CVE-2025-21194 |
|
52.2th | 7.1 | This vulnerability allows attackers to bypass security features on Microsoft Surface devices, potent | |
| 4078 | CVE-2024-10395 |
|
52.2th | 8.6 | This vulnerability in Zephyr RTOS's HTTP server allows buffer overflow attacks due to improper input | |
| 4079 | CVE-2025-3600 |
|
52.1th | 7.5 | An unsafe reflection vulnerability in Progress Telerik UI for AJAX allows attackers to cause unhandl | |
| 4080 | CVE-2025-6158 |
|
52.1th | 8.8 | A critical stack-based buffer overflow vulnerability in D-Link DIR-665 routers allows remote attacke | |
| 4081 | CVE-2025-11490 |
|
52.2th | 6.3 | This CVE describes an OS command injection vulnerability in DesktopCommanderMCP up to version 0.2.13 | |
| 4082 | CVE-2025-62354 |
|
52.1th | 9.8 | This CVE describes a command injection vulnerability in Cursor that allows unauthorized attackers to | |
| 4083 | CVE-2025-10484 |
|
52.2th | 9.8 | This vulnerability allows unauthenticated attackers to bypass authentication in the Registration & L | |
| 4084 | CVE-2025-21598 |
|
52th | 7.5 | An out-of-bounds read vulnerability in Juniper Junos OS and Junos OS Evolved routing protocol daemon | |
| 4085 | CVE-2025-59213 |
|
52.1th | 8.8 | This SQL injection vulnerability in Microsoft Configuration Manager allows unauthorized attackers on | |
| 4086 | CVE-2025-32044 |
|
52.1th | 7.5 | CVE-2025-32044 is an information disclosure vulnerability in Moodle where unauthenticated attackers | |
| 4087 | CVE-2025-3146 |
|
52.1th | 7.3 | This critical SQL injection vulnerability in PHPGurukul Bus Pass Management System 1.0 allows attack | |
| 4088 | CVE-2025-32704 |
|
52.1th | 8.4 | A buffer over-read vulnerability in Microsoft Office Excel allows attackers to read beyond allocated | |
| 4089 | CVE-2025-30377 |
|
52.1th | 8.4 | This vulnerability is a use-after-free memory corruption flaw in Microsoft Office that allows an att | |
| 4090 | CVE-2025-24063 |
|
52.1th | 7.8 | A heap-based buffer overflow vulnerability in the Windows Kernel allows authenticated attackers to e | |
| 4091 | CVE-2025-41427 |
|
52.1th | 8.8 | This vulnerability allows remote authenticated attackers to execute arbitrary operating system comma | |
| 4092 | CVE-2025-55145 |
|
52.1th | 8.9 | This vulnerability allows authenticated remote attackers to hijack existing HTML5 connections in Iva | |
| 4093 | CVE-2025-14002 |
|
52th | 8.1 | The WPCOM Member WordPress plugin has an authentication bypass vulnerability that allows attackers t | |
| 4094 | CVE-2025-67089 |
|
52.1th | 8.1 | A command injection vulnerability in GL-iNet GL-AXT1800 router firmware allows authenticated attacke | |
| 4095 | CVE-2022-31749 |
|
52th | 6.5 | CVE-2022-31749 is an argument injection vulnerability in WatchGuard Fireware OS that allows authenti | |
| 4096 | CVE-2025-30772 |
|
52th | 8.8 | This vulnerability allows attackers to update arbitrary WordPress options without proper authorizati | |
| 4097 | CVE-2025-24084 |
|
52th | 8.4 | CVE-2025-24084 is an untrusted pointer dereference vulnerability in Windows Subsystem for Linux that | |
| 4098 | CVE-2025-2470 |
|
52th | 9.8 | This vulnerability allows unauthenticated attackers to register WordPress accounts with arbitrary ro | |
| 4099 | CVE-2025-46273 |
|
52th | 9.8 | CVE-2025-46273 is a critical vulnerability in UNI-NMS-Lite network management software where hard-co | |
| 4100 | CVE-2025-3068 |
|
52th | 8.8 | This vulnerability allows attackers to escalate privileges in Google Chrome on Android through a cra |
What is EPSS?
The Exploit Prediction Scoring System (EPSS) is a data-driven model developed by FIRST.org that estimates the probability a CVE will be exploited in the wild within the next 30 days. Unlike CVSS which measures severity, EPSS measures likelihood of exploitation — making it ideal for prioritizing which vulnerabilities to patch first.
Why EPSS matters: With thousands of CVEs published monthly, not all vulnerabilities are equally dangerous. EPSS helps security teams focus on the CVEs most likely to be actively exploited, rather than patching solely by CVSS score. A critical CVSS 9.8 vulnerability with 0.1% EPSS may be less urgent than a high CVSS 7.5 with 90% EPSS.
Prioritize by Exploit Risk
Scan your servers and see which vulnerabilities have the highest EPSS scores. Focus on what attackers are actually targeting.
Start Monitoring Free