Most Exploitable CVEs - EPSS Rankings

CVEs ranked by EPSS (Exploit Prediction Scoring System) probability. Higher scores mean a greater likelihood of exploitation in the wild within the next 30 days.

164
EPSS > 50%
156
CISA KEV Listed
35,468
CVEs with EPSS
0.7%
Avg EPSS Score
All Critical High Medium Low
Rank CVE ID EPSS Score Percentile CVSS Flags Summary
4701 CVE-2023-32238
0.07%
20.7th 5.4 This vulnerability allows unauthorized access to functionality in TheGem WordPress theme plugins for
4702 CVE-2024-42718
0.07%
20.7th 6.5 This path traversal vulnerability in Croogo CMS 4.0.7 allows remote attackers to read arbitrary file
4703 CVE-2025-66173
0.07%
20.9th 6.2 A privilege escalation vulnerability in Hikvision DVR/NVR devices allows attackers with physical acc
4704 CVE-2025-67842
0.07%
20.9th 6.4 This vulnerability allows remote attackers to inject malicious scripts or HTML into any tenant's doc
4705 CVE-2021-47704
0.07%
20.8th 6.5 OpenBMCS 2.4 contains an SQL injection vulnerability in the /debug/obix_test.php endpoint that allow
4706 CVE-2025-66206
0.07%
20.9th 6.8 This CVE describes a path traversal vulnerability in Frappe web framework that allows attackers to r
4707 CVE-2026-23630
0.07%
20.8th 5.4 This stored XSS vulnerability in Docmost allows attackers to inject malicious Mermaid diagram code t
4708 CVE-2025-66715
0.07%
20.8th 6.5 This DLL hijacking vulnerability in Axtion ODISSAAS ODIS v1.8.4 allows attackers to place a maliciou
4709 CVE-2024-10847
0.07%
20.6th 6.4 The Storely WordPress theme has a stored cross-site scripting vulnerability that allows authenticate
4710 CVE-2024-12385
0.07%
20.6th 6.1 The WP Abstracts WordPress plugin has a Cross-Site Request Forgery vulnerability that allows attacke
4711 CVE-2024-55945
0.07%
20.5th 4.3 This CSRF vulnerability in TYPO3's backend user interface allows attackers to trick authenticated ba
4712 CVE-2025-21600
0.07%
20.7th 6.5 An out-of-bounds read vulnerability in Juniper's routing protocol daemon (rpd) allows unauthenticate
4713 CVE-2025-1365
0.07%
20.7th 5.3 A critical buffer overflow vulnerability in GNU elfutils' eu-readelf component allows local attacker
4714 CVE-2025-21117
0.07%
20.7th 6.6 Dell Avamar versions 19.4+ have an access token reuse vulnerability in the AUI (Avamar User Interfac
4715 CVE-2025-31187
0.07%
20.7th 5.5 This vulnerability allows an application to modify protected parts of the macOS file system, potenti
4716 CVE-2025-3007
0.07%
20.7th 5.5 A critical stack-based buffer overflow vulnerability in Novastar CX40's NetFilter Utility allows att
4717 CVE-2025-1219
0.07%
20.5th 5.3 This vulnerability in PHP's DOM and SimpleXML extensions causes incorrect charset detection when pro
4718 CVE-2025-1439
0.07%
20.6th 6.4 This stored XSS vulnerability in the Advanced iFrame WordPress plugin allows authenticated attackers
4719 CVE-2024-8736
0.07%
20.7th 6.5 This CSRF vulnerability in lollms-webui allows attackers to cause denial of service by exploiting fi
4720 CVE-2025-20935
0.07%
20.6th 5.5 This vulnerability in Samsung's ClipboardService allows local attackers to access files with system
4721 CVE-2024-49197
0.07%
20.7th 6.5 This vulnerability in Samsung Exynos Wi-Fi chips allows out-of-bounds memory access due to missing b
4722 CVE-2025-5137
0.07%
20.6th 4.7 This CVE describes a critical code injection vulnerability in DedeCMS 5.7.117 that allows remote att
4723 CVE-2025-4939
0.07%
20.5th 4.3 This vulnerability allows attackers to inject malicious scripts into the PHPGurukul Credit Card Appl
4724 CVE-2025-4476
0.07%
20.5th 4.3 A denial-of-service vulnerability in libsoup HTTP client library allows attackers to crash client ap
4725 CVE-2025-53298
0.07%
20.5th 4.9 This path traversal vulnerability in the WordPress Plugin Inspector plugin allows attackers to downl
4726 CVE-2025-49550
0.07%
20.6th 4.3 Adobe Commerce has an incorrect authorization vulnerability (CWE-863) that allows attackers to bypas
4727 CVE-2025-53561
0.07%
20.6th 6.5 A path traversal vulnerability in the miniOrange Prevent files/folders access WordPress plugin allow
4728 CVE-2025-47650
0.07%
20.6th 6.5 This path traversal vulnerability in Infility Global WordPress plugin allows attackers to access fil
4729 CVE-2025-41242
0.07%
20.7th 5.9 Spring Framework MVC applications can be vulnerable to path traversal attacks when deployed on non-c
4730 CVE-2025-8091
0.07%
20.6th 4.3 The EventON Lite WordPress plugin versions up to 2.4.6 contain an information exposure vulnerability
4731 CVE-2025-43815
0.07%
20.5th 6.1 A reflected cross-site scripting (XSS) vulnerability in Liferay Portal and DXP allows attackers to i
4732 CVE-2025-34230
0.07%
20.6th 5.8 This CVE describes a blind server-side request forgery (SSRF) vulnerability in Vasion Print (formerl
4733 CVE-2025-34229
0.07%
20.6th 5.8 This CVE describes a blind server-side request forgery (SSRF) vulnerability in Vasion Print (formerl
4734 CVE-2025-11028
0.07%
20.6th 5.3 This CVE-2025-11028 vulnerability in givanz Vvveb's Image Handler component allows remote attackers
4735 CVE-2025-43779
0.07%
20.5th 6.1 A reflected cross-site scripting vulnerability in Liferay Portal and DXP allows authenticated attack
4736 CVE-2025-26514
0.07%
20.6th 6.4 This is a reflected cross-site scripting (XSS) vulnerability in NetApp StorageGRID that allows attac
4737 CVE-2024-43184
0.07%
20.7th 6.1 This cross-site scripting (XSS) vulnerability in IBM Jazz Foundation allows unauthenticated attacker
4738 CVE-2025-43830
0.07%
20.5th 6.1 A stored cross-site scripting (XSS) vulnerability in Liferay Portal and DXP allows attackers to inje
4739 CVE-2025-3448
0.07%
20.5th 6.1 A reflected cross-site scripting (XSS) vulnerability in B&R Automation Runtime's System Diagnostics
4740 CVE-2025-58586
0.07%
20.6th 5.3 This vulnerability allows attackers to enumerate valid usernames by observing different error messag
4741 CVE-2025-58580
0.07%
20.6th 6.5 This vulnerability allows attackers to create arbitrary log entries via an unvalidated API endpoint.
4742 CVE-2025-11999
0.07%
20.6th 5.3 The Add Multiple Marker WordPress plugin has missing capability checks in two functions, allowing un
4743 CVE-2025-62426
0.07%
20.6th 6.5 This vulnerability in vLLM allows attackers to send specially crafted requests to the /v1/chat/compl
4744 CVE-2025-55128
0.07%
20.6th 6.5 An uncontrolled resource consumption vulnerability in userlog-index.php allows authenticated admin u
4745 CVE-2025-13411
0.07%
20.5th 4.7 This vulnerability in Campcodes Retro Basketball Shoes Online Store 1.0 allows attackers to upload a
4746 CVE-2025-60728
0.07%
20.7th 4.3 This vulnerability in Microsoft Office Excel involves an untrusted pointer dereference that could al
4747 CVE-2025-21075
0.07%
20.5th 4.3 This vulnerability is an out-of-bounds write in Samsung's libimagecodec.quram.so library that allows
4748 CVE-2025-12898
0.07%
20.6th 5.3 The Pretty Google Calendar WordPress plugin has an authentication bypass vulnerability that allows u
4749 CVE-2025-12809
0.07%
20.6th 5.3 The Dokan Pro WordPress plugin has a missing capability check on its wholesale registration REST API
4750 CVE-2025-14674
0.07%
20.6th 6.3 This vulnerability allows remote attackers to execute arbitrary code through injection in the QLExpr

What is EPSS?

The Exploit Prediction Scoring System (EPSS) is a data-driven model developed by FIRST.org that estimates the probability a CVE will be exploited in the wild within the next 30 days. Unlike CVSS which measures severity, EPSS measures likelihood of exploitation — making it ideal for prioritizing which vulnerabilities to patch first.

Why EPSS matters: With thousands of CVEs published monthly, not all vulnerabilities are equally dangerous. EPSS helps security teams focus on the CVEs most likely to be actively exploited, rather than patching solely by CVSS score. A critical CVSS 9.8 vulnerability with 0.1% EPSS may be less urgent than a high CVSS 7.5 with 90% EPSS.

Prioritize by Exploit Risk

Scan your servers and see which vulnerabilities have the highest EPSS scores. Focus on what attackers are actually targeting.

Start Monitoring Free