Most Exploitable CVEs - EPSS Rankings

CVEs ranked by EPSS (Exploit Prediction Scoring System) probability. Higher scores mean a greater likelihood of exploitation in the wild within the next 30 days.

164
EPSS > 50%
156
CISA KEV Listed
35,468
CVEs with EPSS
0.7%
Avg EPSS Score
All Critical High Medium Low
Rank CVE ID EPSS Score Percentile CVSS Flags Summary
4601 CVE-2025-49559
0.25%
48.3th 5.3 This CVE describes a path traversal vulnerability in Adobe Commerce that allows attackers to bypass
4602 CVE-2025-52322
0.25%
48.3th 7.5 A vulnerability in Open5GS allows remote attackers to cause denial of service by sending a specially
4603 CVE-2023-53926
0.25%
48.3th 9.8 PHPJabbers Simple CMS 5.0 contains a SQL injection vulnerability in the 'column' parameter that allo
4604 CVE-2023-37022
0.25%
48.2th 7.5 Open5GS MME versions up to 2.6.4 contain a reachable assertion vulnerability in the UE Context Relea
4605 CVE-2023-37014
0.25%
48.2th 7.5 CVE-2023-37014 is a denial-of-service vulnerability in Open5GS MME where attackers can send malforme
4606 CVE-2024-12332
0.25%
48.3th 6.5 The WPSchoolPress WordPress plugin contains a SQL injection vulnerability in the 'cid' parameter tha
4607 CVE-2025-26753
0.25%
48.2th 7.5 This path traversal vulnerability in VideoWhisper Live Streaming Integration allows attackers to dow
4608 CVE-2025-25283
0.25%
48.2th 7.5 The parse-duration library versions before 2.1.3 are vulnerable to denial of service attacks through
4609 CVE-2025-25530
0.25%
48.2th 9.8 A buffer overflow vulnerability in Digital China DCBI-Netlog-LAB Gateway 1.0 allows attackers to cra
4610 CVE-2025-25155
0.25%
48.2th 7.5 This path traversal vulnerability in the efreja Music Sheet Viewer WordPress plugin allows attackers
4611 CVE-2025-24569
0.25%
48.2th 7.5 This path traversal vulnerability in the PDF Generator Addon for Elementor Page Builder WordPress pl
4612 CVE-2025-23819
0.25%
48.2th 7.5 This path traversal vulnerability in the WP Cloud WordPress plugin allows attackers to delete arbitr
4613 CVE-2025-30437
0.25%
48.2th 7.4 This vulnerability in macOS allows malicious applications to corrupt coprocessor memory due to insuf
4614 CVE-2025-0315
0.25%
48.2th 7.5 A memory exhaustion vulnerability in Ollama allows attackers to upload specially crafted GGUF model
4615 CVE-2025-2493
0.25%
48.2th 7.5 This path traversal vulnerability in Softdial Contact Center allows attackers to manipulate the 'id'
4616 CVE-2025-29390
0.25%
48.2th 8.8 CVE-2025-29390 is a SQL injection vulnerability in jerryhanjj ERP 1.0's set_password function that a
4617 CVE-2025-1968
0.25%
48.2th 7.7 This vulnerability allows attackers to reuse expired session IDs in Progress Sitefinity under specif
4618 CVE-2025-31095
0.25%
48.2th 9.8 CVE-2025-31095 is an authentication bypass vulnerability in the Material Dashboard WordPress plugin
4619 CVE-2025-4948
0.25%
48.2th 7.5 An integer underflow vulnerability in libsoup's soup_multipart_new_from_message() function allows sp
4620 CVE-2025-3918
0.25%
48.2th 9.8 The Job Listings WordPress plugin versions 0.1 to 0.1.1 contain a privilege escalation vulnerability
4621 CVE-2025-6206
0.25%
48.2th 7.5 This vulnerability allows authenticated WordPress users with Subscriber-level access or higher to up
4622 CVE-2025-10548
0.25%
48.2th 6.5 CleverControl employee monitoring software fails to validate TLS certificates during installation, a
4623 CVE-2025-66219
0.25%
48.2th 9.8 CVE-2025-66219 is a command injection vulnerability in willitmerge, a command-line tool for checking
4624 CVE-2025-13768
0.25%
48.2th 7.5 WebITR software developed by Uniong contains an authentication bypass vulnerability that allows auth
4625 CVE-2023-7332
0.25%
48.2th N/A This vulnerability allows remote attackers with valid player sessions to crash PocketMine-MP game se
4626 CVE-2026-2155
0.25%
48.2th 7.2 This CVE describes a remote command injection vulnerability in D-Link DIR-823X routers. Attackers ca
4627 CVE-2026-2084
0.25%
48.2th 7.2 This CVE describes an OS command injection vulnerability in D-Link DIR-823X routers. Attackers can r
4628 CVE-2026-1331
0.25%
48.2th 9.8 MeetingHub software from HAMASTAR Technology contains an unauthenticated arbitrary file upload vulne
4629 CVE-2024-10970
0.25%
48.1th 5.4 This vulnerability allows authenticated WordPress users with Subscriber-level access or higher to ex
4630 CVE-2025-2231
0.25%
48.1th 7.8 This vulnerability in PDF-XChange Editor allows remote attackers to execute arbitrary code by tricki
4631 CVE-2025-2748
0.25%
48.2th 6.1 Kentico Xperience has a stored cross-site scripting (XSS) vulnerability in its multiple-file upload
4632 CVE-2024-8063
0.25%
48.1th 7.5 A divide-by-zero vulnerability in ollama/ollama v0.3.3 allows attackers to cause denial of service b
4633 CVE-2025-25967
0.25%
48.1th 8.8 Acora CMS version 10.1.1 has a Cross-Site Request Forgery (CSRF) vulnerability that allows attackers
4634 CVE-2025-3566
0.25%
48.1th 7.3 This critical vulnerability in veal98 Echo Community System 4.2 allows remote attackers to upload ar
4635 CVE-2025-6568
0.25%
48.1th 8.8 A critical buffer overflow vulnerability in TOTOLINK EX1200T routers allows remote attackers to exec
4636 CVE-2025-5869
0.25%
48.1th 8.0 A critical memory corruption vulnerability exists in RT-Thread's sys_recvfrom function, allowing att
4637 CVE-2024-58309
0.25%
48.1th 9.8 CVE-2024-58309 is an unauthenticated SQL injection vulnerability in xbtitFM 4.1.18 that allows remot
4638 CVE-2026-24748
0.25%
48.2th 7.2 This CVE describes an authentication bypass vulnerability in Kargo's API endpoints. Unauthenticated
4639 CVE-2026-22265
0.25%
48.1th 7.5 CVE-2026-22265 is a command injection vulnerability in Roxy-WI web interface versions prior to 8.2.8
4640 CVE-2022-50922
0.25%
48.1th 9.8 Audio Conversion Wizard v2.01 contains a buffer overflow vulnerability that allows attackers to exec
4641 CVE-2025-11730
0.25%
48.2th 7.2 This CVE describes a post-authentication command injection vulnerability in Zyxel firewall devices.
4642 CVE-2025-69516
0.25%
48.1th 8.8 A Server-Side Template Injection vulnerability in Amidaware Tactical RMM allows low-privileged users
4643 CVE-2024-39802
0.25%
48.1th 9.1 This vulnerability allows authenticated attackers to execute arbitrary code on Wavlink AC3000 router
4644 CVE-2024-39770
0.25%
48.1th 9.1 This vulnerability allows authenticated attackers to execute arbitrary code on Wavlink AC3000 router
4645 CVE-2024-39768
0.25%
48.1th 9.1 This CVE describes multiple buffer overflow vulnerabilities in the Wavlink AC3000 router's internet.
4646 CVE-2025-24418
0.25%
48.1th 8.1 CVE-2025-24418 is an improper authorization vulnerability in Adobe Commerce that allows low-privileg
4647 CVE-2025-24470
0.25%
47.9th 8.6 CVE-2025-24470 is an Improper Resolution of Path Equivalence vulnerability in FortiPortal that allow
4648 CVE-2025-1107
0.25%
48.1th 9.9 CVE-2025-1107 is an unverified password change vulnerability in Janto software that allows unauthent
4649 CVE-2025-3529
0.25%
47.9th 8.2 The WordPress Simple Shopping Cart plugin has a vulnerability that allows unauthenticated attackers
4650 CVE-2025-27980
0.25%
48.1th 6.5 Cashbook v4.0.3 contains an arbitrary file read vulnerability in the /api/entry/flow/invoice/show en

What is EPSS?

The Exploit Prediction Scoring System (EPSS) is a data-driven model developed by FIRST.org that estimates the probability a CVE will be exploited in the wild within the next 30 days. Unlike CVSS which measures severity, EPSS measures likelihood of exploitation — making it ideal for prioritizing which vulnerabilities to patch first.

Why EPSS matters: With thousands of CVEs published monthly, not all vulnerabilities are equally dangerous. EPSS helps security teams focus on the CVEs most likely to be actively exploited, rather than patching solely by CVSS score. A critical CVSS 9.8 vulnerability with 0.1% EPSS may be less urgent than a high CVSS 7.5 with 90% EPSS.

Prioritize by Exploit Risk

Scan your servers and see which vulnerabilities have the highest EPSS scores. Focus on what attackers are actually targeting.

Start Monitoring Free