Most Exploitable CVEs - EPSS Rankings
CVEs ranked by EPSS (Exploit Prediction Scoring System) probability. Higher scores mean a greater likelihood of exploitation in the wild within the next 30 days.
| Rank | CVE ID | EPSS Score | Percentile | CVSS | Flags | Summary |
|---|---|---|---|---|---|---|
| 4601 | CVE-2025-49559 |
|
48.3th | 5.3 | This CVE describes a path traversal vulnerability in Adobe Commerce that allows attackers to bypass | |
| 4602 | CVE-2025-52322 |
|
48.3th | 7.5 | A vulnerability in Open5GS allows remote attackers to cause denial of service by sending a specially | |
| 4603 | CVE-2023-53926 |
|
48.3th | 9.8 | PHPJabbers Simple CMS 5.0 contains a SQL injection vulnerability in the 'column' parameter that allo | |
| 4604 | CVE-2023-37022 |
|
48.2th | 7.5 | Open5GS MME versions up to 2.6.4 contain a reachable assertion vulnerability in the UE Context Relea | |
| 4605 | CVE-2023-37014 |
|
48.2th | 7.5 | CVE-2023-37014 is a denial-of-service vulnerability in Open5GS MME where attackers can send malforme | |
| 4606 | CVE-2024-12332 |
|
48.3th | 6.5 | The WPSchoolPress WordPress plugin contains a SQL injection vulnerability in the 'cid' parameter tha | |
| 4607 | CVE-2025-26753 |
|
48.2th | 7.5 | This path traversal vulnerability in VideoWhisper Live Streaming Integration allows attackers to dow | |
| 4608 | CVE-2025-25283 |
|
48.2th | 7.5 | The parse-duration library versions before 2.1.3 are vulnerable to denial of service attacks through | |
| 4609 | CVE-2025-25530 |
|
48.2th | 9.8 | A buffer overflow vulnerability in Digital China DCBI-Netlog-LAB Gateway 1.0 allows attackers to cra | |
| 4610 | CVE-2025-25155 |
|
48.2th | 7.5 | This path traversal vulnerability in the efreja Music Sheet Viewer WordPress plugin allows attackers | |
| 4611 | CVE-2025-24569 |
|
48.2th | 7.5 | This path traversal vulnerability in the PDF Generator Addon for Elementor Page Builder WordPress pl | |
| 4612 | CVE-2025-23819 |
|
48.2th | 7.5 | This path traversal vulnerability in the WP Cloud WordPress plugin allows attackers to delete arbitr | |
| 4613 | CVE-2025-30437 |
|
48.2th | 7.4 | This vulnerability in macOS allows malicious applications to corrupt coprocessor memory due to insuf | |
| 4614 | CVE-2025-0315 |
|
48.2th | 7.5 | A memory exhaustion vulnerability in Ollama allows attackers to upload specially crafted GGUF model | |
| 4615 | CVE-2025-2493 |
|
48.2th | 7.5 | This path traversal vulnerability in Softdial Contact Center allows attackers to manipulate the 'id' | |
| 4616 | CVE-2025-29390 |
|
48.2th | 8.8 | CVE-2025-29390 is a SQL injection vulnerability in jerryhanjj ERP 1.0's set_password function that a | |
| 4617 | CVE-2025-1968 |
|
48.2th | 7.7 | This vulnerability allows attackers to reuse expired session IDs in Progress Sitefinity under specif | |
| 4618 | CVE-2025-31095 |
|
48.2th | 9.8 | CVE-2025-31095 is an authentication bypass vulnerability in the Material Dashboard WordPress plugin | |
| 4619 | CVE-2025-4948 |
|
48.2th | 7.5 | An integer underflow vulnerability in libsoup's soup_multipart_new_from_message() function allows sp | |
| 4620 | CVE-2025-3918 |
|
48.2th | 9.8 | The Job Listings WordPress plugin versions 0.1 to 0.1.1 contain a privilege escalation vulnerability | |
| 4621 | CVE-2025-6206 |
|
48.2th | 7.5 | This vulnerability allows authenticated WordPress users with Subscriber-level access or higher to up | |
| 4622 | CVE-2025-10548 |
|
48.2th | 6.5 | CleverControl employee monitoring software fails to validate TLS certificates during installation, a | |
| 4623 | CVE-2025-66219 |
|
48.2th | 9.8 | CVE-2025-66219 is a command injection vulnerability in willitmerge, a command-line tool for checking | |
| 4624 | CVE-2025-13768 |
|
48.2th | 7.5 | WebITR software developed by Uniong contains an authentication bypass vulnerability that allows auth | |
| 4625 | CVE-2023-7332 |
|
48.2th | N/A | This vulnerability allows remote attackers with valid player sessions to crash PocketMine-MP game se | |
| 4626 | CVE-2026-2155 |
|
48.2th | 7.2 | This CVE describes a remote command injection vulnerability in D-Link DIR-823X routers. Attackers ca | |
| 4627 | CVE-2026-2084 |
|
48.2th | 7.2 | This CVE describes an OS command injection vulnerability in D-Link DIR-823X routers. Attackers can r | |
| 4628 | CVE-2026-1331 |
|
48.2th | 9.8 | MeetingHub software from HAMASTAR Technology contains an unauthenticated arbitrary file upload vulne | |
| 4629 | CVE-2024-10970 |
|
48.1th | 5.4 | This vulnerability allows authenticated WordPress users with Subscriber-level access or higher to ex | |
| 4630 | CVE-2025-2231 |
|
48.1th | 7.8 | This vulnerability in PDF-XChange Editor allows remote attackers to execute arbitrary code by tricki | |
| 4631 | CVE-2025-2748 |
|
48.2th | 6.1 | Kentico Xperience has a stored cross-site scripting (XSS) vulnerability in its multiple-file upload | |
| 4632 | CVE-2024-8063 |
|
48.1th | 7.5 | A divide-by-zero vulnerability in ollama/ollama v0.3.3 allows attackers to cause denial of service b | |
| 4633 | CVE-2025-25967 |
|
48.1th | 8.8 | Acora CMS version 10.1.1 has a Cross-Site Request Forgery (CSRF) vulnerability that allows attackers | |
| 4634 | CVE-2025-3566 |
|
48.1th | 7.3 | This critical vulnerability in veal98 Echo Community System 4.2 allows remote attackers to upload ar | |
| 4635 | CVE-2025-6568 |
|
48.1th | 8.8 | A critical buffer overflow vulnerability in TOTOLINK EX1200T routers allows remote attackers to exec | |
| 4636 | CVE-2025-5869 |
|
48.1th | 8.0 | A critical memory corruption vulnerability exists in RT-Thread's sys_recvfrom function, allowing att | |
| 4637 | CVE-2024-58309 |
|
48.1th | 9.8 | CVE-2024-58309 is an unauthenticated SQL injection vulnerability in xbtitFM 4.1.18 that allows remot | |
| 4638 | CVE-2026-24748 |
|
48.2th | 7.2 | This CVE describes an authentication bypass vulnerability in Kargo's API endpoints. Unauthenticated | |
| 4639 | CVE-2026-22265 |
|
48.1th | 7.5 | CVE-2026-22265 is a command injection vulnerability in Roxy-WI web interface versions prior to 8.2.8 | |
| 4640 | CVE-2022-50922 |
|
48.1th | 9.8 | Audio Conversion Wizard v2.01 contains a buffer overflow vulnerability that allows attackers to exec | |
| 4641 | CVE-2025-11730 |
|
48.2th | 7.2 | This CVE describes a post-authentication command injection vulnerability in Zyxel firewall devices. | |
| 4642 | CVE-2025-69516 |
|
48.1th | 8.8 | A Server-Side Template Injection vulnerability in Amidaware Tactical RMM allows low-privileged users | |
| 4643 | CVE-2024-39802 |
|
48.1th | 9.1 | This vulnerability allows authenticated attackers to execute arbitrary code on Wavlink AC3000 router | |
| 4644 | CVE-2024-39770 |
|
48.1th | 9.1 | This vulnerability allows authenticated attackers to execute arbitrary code on Wavlink AC3000 router | |
| 4645 | CVE-2024-39768 |
|
48.1th | 9.1 | This CVE describes multiple buffer overflow vulnerabilities in the Wavlink AC3000 router's internet. | |
| 4646 | CVE-2025-24418 |
|
48.1th | 8.1 | CVE-2025-24418 is an improper authorization vulnerability in Adobe Commerce that allows low-privileg | |
| 4647 | CVE-2025-24470 |
|
47.9th | 8.6 | CVE-2025-24470 is an Improper Resolution of Path Equivalence vulnerability in FortiPortal that allow | |
| 4648 | CVE-2025-1107 |
|
48.1th | 9.9 | CVE-2025-1107 is an unverified password change vulnerability in Janto software that allows unauthent | |
| 4649 | CVE-2025-3529 |
|
47.9th | 8.2 | The WordPress Simple Shopping Cart plugin has a vulnerability that allows unauthenticated attackers | |
| 4650 | CVE-2025-27980 |
|
48.1th | 6.5 | Cashbook v4.0.3 contains an arbitrary file read vulnerability in the /api/entry/flow/invoice/show en |
What is EPSS?
The Exploit Prediction Scoring System (EPSS) is a data-driven model developed by FIRST.org that estimates the probability a CVE will be exploited in the wild within the next 30 days. Unlike CVSS which measures severity, EPSS measures likelihood of exploitation — making it ideal for prioritizing which vulnerabilities to patch first.
Why EPSS matters: With thousands of CVEs published monthly, not all vulnerabilities are equally dangerous. EPSS helps security teams focus on the CVEs most likely to be actively exploited, rather than patching solely by CVSS score. A critical CVSS 9.8 vulnerability with 0.1% EPSS may be less urgent than a high CVSS 7.5 with 90% EPSS.
Prioritize by Exploit Risk
Scan your servers and see which vulnerabilities have the highest EPSS scores. Focus on what attackers are actually targeting.
Start Monitoring Free