Most Exploitable CVEs - EPSS Rankings

CVEs ranked by EPSS (Exploit Prediction Scoring System) probability. Higher scores mean a greater likelihood of exploitation in the wild within the next 30 days.

164
EPSS > 50%
156
CISA KEV Listed
35,468
CVEs with EPSS
0.7%
Avg EPSS Score
All Critical High Medium Low
Rank CVE ID EPSS Score Percentile CVSS Flags Summary
4451 CVE-2025-21575
0.26%
49.4th 6.5 A vulnerability in MySQL Server's parser component allows low-privileged attackers with network acce
4452 CVE-2025-27391
0.26%
49.4th 6.5 Apache ActiveMQ Artemis versions 1.5.1 through 2.39.0 log sensitive broker configuration properties
4453 CVE-2025-29840
0.26%
49.4th 8.8 A stack-based buffer overflow vulnerability in Windows Media allows remote attackers to execute arbi
4454 CVE-2024-13974
0.26%
49.4th 8.1 This vulnerability in Sophos Firewall's Up2Date component allows attackers who control the firewall'
4455 CVE-2024-52964
0.26%
49.4th 5.5 This path traversal vulnerability in Fortinet FortiManager and FortiManager Cloud allows authenticat
4456 CVE-2025-9519
0.26%
49.3th 7.2 The Easy Timer WordPress plugin allows authenticated attackers with Editor-level permissions or high
4457 CVE-2025-14541
0.26%
49.4th 7.2 The Lucky Wheel Giveaway WordPress plugin contains a remote code execution vulnerability in all vers
4458 CVE-2024-53923
0.26%
49.3th 9.1 This vulnerability allows authenticated users with high privileges in Centreon Web to perform SQL in
4459 CVE-2024-43762
0.26%
49.2th 7.8 This CVE describes a local privilege escalation vulnerability in Android's service binding logic. An
4460 CVE-2023-51311
0.26%
49.2th 8.8 CVE-2023-51311 is a CSV injection vulnerability in PHPJabbers Car Park Booking System v3.0 that allo
4461 CVE-2025-24605
0.26%
49.2th 4.9 This path traversal vulnerability in the WOLF WordPress plugin allows attackers to access files outs
4462 CVE-2025-2877
0.26%
49.2th 6.5 This vulnerability in Ansible Automation Platform's Event-Driven Ansible exposes inventory passwords
4463 CVE-2024-7044
0.26%
49.2th 8.9 A stored XSS vulnerability in open-webui version 0.3.8 allows attackers to upload malicious files co
4464 CVE-2025-3143
0.26%
49.2th 6.3 This critical SQL injection vulnerability in SourceCodester Apartment Visitor Management System 1.0
4465 CVE-2025-7092
0.26%
49.3th 8.8 A critical stack-based buffer overflow vulnerability in Belkin F9K1122 routers allows remote attacke
4466 CVE-2025-7090
0.26%
49.3th 8.8 A critical stack-based buffer overflow vulnerability in Belkin F9K1122 routers allows remote attacke
4467 CVE-2024-13342
0.26%
49.2th 8.1 The Booster for WooCommerce WordPress plugin allows unauthenticated attackers to upload arbitrary fi
4468 CVE-2025-8905
0.26%
49.3th 6.3 The Inpersttion For Theme WordPress plugin has a remote code execution vulnerability that allows aut
4469 CVE-2025-10441
0.26%
49.2th 6.3 This CVE describes an OS command injection vulnerability in D-Link routers' web interface. Attackers
4470 CVE-2025-10440
0.26%
49.2th 6.3 This CVE describes an OS command injection vulnerability in D-Link routers' jhttpd component via the
4471 CVE-2025-61772
0.26%
49.2th 7.5 This vulnerability in Rack's multipart parser allows remote attackers to cause denial of service by
4472 CVE-2021-47745
0.26%
49.3th 8.8 CVE-2021-47745 is an authenticated command injection vulnerability in Cypress Solutions CTM-200 firm
4473 CVE-2026-1021
0.26%
49.2th 9.8 The Police Statistics Database System developed by Gotac contains an arbitrary file upload vulnerabi
4474 CVE-2026-24841
0.26%
49.2th 9.9 CVE-2026-24841 is a critical command injection vulnerability in Dokploy, a self-hosted PaaS, allowin
4475 CVE-2024-40513
0.26%
49.1th 4.6 This vulnerability in themesebrand Chatvia v5.3.2 allows remote attackers to execute arbitrary code
4476 CVE-2024-57661
0.26%
49.2th 7.5 A vulnerability in the sqlo_df component of OpenLink Virtuoso OpenSource allows attackers to cause D
4477 CVE-2024-56290
0.26%
49.1th 9.3 This SQL injection vulnerability in the WordPress plugin 'Multiple Shipping And Billing Address For
4478 CVE-2024-56286
0.26%
49.1th 7.5 This path traversal vulnerability in Classic Addons for WPBakery Page Builder allows attackers to in
4479 CVE-2025-26905
0.26%
49.1th 7.5 This path traversal vulnerability in the Estatik WordPress plugin allows attackers to include arbitr
4480 CVE-2025-21419
0.26%
49.2th 7.1 This vulnerability allows an authenticated attacker to exploit Windows Setup cleanup processes to ga
4481 CVE-2025-24059
0.26%
49.2th 7.8 This vulnerability in Windows Common Log File System Driver involves incorrect numeric type conversi
4482 CVE-2025-32259
0.26%
49.2th 5.3 CVE-2025-32259 is a missing authorization vulnerability in the WP ULike WordPress plugin that allows
4483 CVE-2025-1123
0.26%
49.1th 7.2 The Solid Mail WordPress plugin has a stored XSS vulnerability that allows unauthenticated attackers
4484 CVE-2025-52903
0.26%
49.1th 8.0 CVE-2025-52903 is a command injection vulnerability in File Browser version 2.32.0 that allows authe
4485 CVE-2025-7345
0.26%
49.2th 7.5 A heap buffer overflow vulnerability in gdk-pixbuf and glib allows processing malicious JPEG images
4486 CVE-2025-64989
0.26%
49.2th 7.2 A command injection vulnerability in TeamViewer DEX (formerly 1E DEX) allows authenticated attackers
4487 CVE-2025-53679
0.26%
49.2th 7.2 This OS command injection vulnerability in Fortinet FortiSandbox allows remote privileged attackers
4488 CVE-2025-0430
0.26%
49th 7.5 CVE-2025-0430 is a NULL pointer dereference vulnerability in Belledonne Communications Linphone-Desk
4489 CVE-2025-22144
0.26%
49.1th 9.8 This vulnerability in NamelessMC allows attackers with admincp.core.emails or admincp.users.edit per
4490 CVE-2025-0244
0.26%
49.1th 5.3 This vulnerability in Firefox for Android allows attackers to spoof the address bar when redirecting
4491 CVE-2024-12063
0.26%
49th 7.5 A Denial of Service vulnerability in imartinez/privategpt v0.6.2 allows attackers to crash the serve
4492 CVE-2025-1864
0.26%
49.1th 9.8 CVE-2025-1864 is a memory buffer overflow vulnerability in radare2, a reverse engineering framework.
4493 CVE-2025-2883
0.26%
49th 5.3 The Accept SagePay Payments Using Contact Form 7 WordPress plugin exposes sensitive server informati
4494 CVE-2024-13820
0.26%
49th 5.3 The Melhor Envio WordPress plugin exposes sensitive information through a hardcoded hash in the 'run
4495 CVE-2025-31558
0.26%
49.1th 5.8 This vulnerability in the TailPress WordPress plugin allows attackers to retrieve embedded sensitive
4496 CVE-2025-31550
0.26%
49.1th 5.8 This vulnerability in the WP-LESS WordPress plugin allows attackers to retrieve sensitive data embed
4497 CVE-2025-31842
0.26%
49.1th 5.3 This vulnerability in the Viral Loops WP Integration WordPress plugin allows attackers to retrieve s
4498 CVE-2025-31788
0.26%
49.1th 5.3 This vulnerability allows attackers to retrieve sensitive data embedded in log files generated by th
4499 CVE-2025-3810
0.26%
49th 9.8 The WPBookit WordPress plugin has an authentication bypass vulnerability that allows unauthenticated
4500 CVE-2025-8131
0.26%
49.1th 8.8 This critical vulnerability in Tenda AC20 routers allows remote attackers to execute arbitrary code

What is EPSS?

The Exploit Prediction Scoring System (EPSS) is a data-driven model developed by FIRST.org that estimates the probability a CVE will be exploited in the wild within the next 30 days. Unlike CVSS which measures severity, EPSS measures likelihood of exploitation — making it ideal for prioritizing which vulnerabilities to patch first.

Why EPSS matters: With thousands of CVEs published monthly, not all vulnerabilities are equally dangerous. EPSS helps security teams focus on the CVEs most likely to be actively exploited, rather than patching solely by CVSS score. A critical CVSS 9.8 vulnerability with 0.1% EPSS may be less urgent than a high CVSS 7.5 with 90% EPSS.

Prioritize by Exploit Risk

Scan your servers and see which vulnerabilities have the highest EPSS scores. Focus on what attackers are actually targeting.

Start Monitoring Free