Most Exploitable CVEs - EPSS Rankings
CVEs ranked by EPSS (Exploit Prediction Scoring System) probability. Higher scores mean a greater likelihood of exploitation in the wild within the next 30 days.
| Rank | CVE ID | EPSS Score | Percentile | CVSS | Flags | Summary |
|---|---|---|---|---|---|---|
| 4701 | CVE-2023-32238 |
|
20.7th | 5.4 | This vulnerability allows unauthorized access to functionality in TheGem WordPress theme plugins for | |
| 4702 | CVE-2024-42718 |
|
20.7th | 6.5 | This path traversal vulnerability in Croogo CMS 4.0.7 allows remote attackers to read arbitrary file | |
| 4703 | CVE-2025-66173 |
|
20.9th | 6.2 | A privilege escalation vulnerability in Hikvision DVR/NVR devices allows attackers with physical acc | |
| 4704 | CVE-2025-67842 |
|
20.9th | 6.4 | This vulnerability allows remote attackers to inject malicious scripts or HTML into any tenant's doc | |
| 4705 | CVE-2021-47704 |
|
20.8th | 6.5 | OpenBMCS 2.4 contains an SQL injection vulnerability in the /debug/obix_test.php endpoint that allow | |
| 4706 | CVE-2025-66206 |
|
20.9th | 6.8 | This CVE describes a path traversal vulnerability in Frappe web framework that allows attackers to r | |
| 4707 | CVE-2026-23630 |
|
20.8th | 5.4 | This stored XSS vulnerability in Docmost allows attackers to inject malicious Mermaid diagram code t | |
| 4708 | CVE-2025-66715 |
|
20.8th | 6.5 | This DLL hijacking vulnerability in Axtion ODISSAAS ODIS v1.8.4 allows attackers to place a maliciou | |
| 4709 | CVE-2024-10847 |
|
20.6th | 6.4 | The Storely WordPress theme has a stored cross-site scripting vulnerability that allows authenticate | |
| 4710 | CVE-2024-12385 |
|
20.6th | 6.1 | The WP Abstracts WordPress plugin has a Cross-Site Request Forgery vulnerability that allows attacke | |
| 4711 | CVE-2024-55945 |
|
20.5th | 4.3 | This CSRF vulnerability in TYPO3's backend user interface allows attackers to trick authenticated ba | |
| 4712 | CVE-2025-21600 |
|
20.7th | 6.5 | An out-of-bounds read vulnerability in Juniper's routing protocol daemon (rpd) allows unauthenticate | |
| 4713 | CVE-2025-1365 |
|
20.7th | 5.3 | A critical buffer overflow vulnerability in GNU elfutils' eu-readelf component allows local attacker | |
| 4714 | CVE-2025-21117 |
|
20.7th | 6.6 | Dell Avamar versions 19.4+ have an access token reuse vulnerability in the AUI (Avamar User Interfac | |
| 4715 | CVE-2025-31187 |
|
20.7th | 5.5 | This vulnerability allows an application to modify protected parts of the macOS file system, potenti | |
| 4716 | CVE-2025-3007 |
|
20.7th | 5.5 | A critical stack-based buffer overflow vulnerability in Novastar CX40's NetFilter Utility allows att | |
| 4717 | CVE-2025-1219 |
|
20.5th | 5.3 | This vulnerability in PHP's DOM and SimpleXML extensions causes incorrect charset detection when pro | |
| 4718 | CVE-2025-1439 |
|
20.6th | 6.4 | This stored XSS vulnerability in the Advanced iFrame WordPress plugin allows authenticated attackers | |
| 4719 | CVE-2024-8736 |
|
20.7th | 6.5 | This CSRF vulnerability in lollms-webui allows attackers to cause denial of service by exploiting fi | |
| 4720 | CVE-2025-20935 |
|
20.6th | 5.5 | This vulnerability in Samsung's ClipboardService allows local attackers to access files with system | |
| 4721 | CVE-2024-49197 |
|
20.7th | 6.5 | This vulnerability in Samsung Exynos Wi-Fi chips allows out-of-bounds memory access due to missing b | |
| 4722 | CVE-2025-5137 |
|
20.6th | 4.7 | This CVE describes a critical code injection vulnerability in DedeCMS 5.7.117 that allows remote att | |
| 4723 | CVE-2025-4939 |
|
20.5th | 4.3 | This vulnerability allows attackers to inject malicious scripts into the PHPGurukul Credit Card Appl | |
| 4724 | CVE-2025-4476 |
|
20.5th | 4.3 | A denial-of-service vulnerability in libsoup HTTP client library allows attackers to crash client ap | |
| 4725 | CVE-2025-53298 |
|
20.5th | 4.9 | This path traversal vulnerability in the WordPress Plugin Inspector plugin allows attackers to downl | |
| 4726 | CVE-2025-49550 |
|
20.6th | 4.3 | Adobe Commerce has an incorrect authorization vulnerability (CWE-863) that allows attackers to bypas | |
| 4727 | CVE-2025-53561 |
|
20.6th | 6.5 | A path traversal vulnerability in the miniOrange Prevent files/folders access WordPress plugin allow | |
| 4728 | CVE-2025-47650 |
|
20.6th | 6.5 | This path traversal vulnerability in Infility Global WordPress plugin allows attackers to access fil | |
| 4729 | CVE-2025-41242 |
|
20.7th | 5.9 | Spring Framework MVC applications can be vulnerable to path traversal attacks when deployed on non-c | |
| 4730 | CVE-2025-8091 |
|
20.6th | 4.3 | The EventON Lite WordPress plugin versions up to 2.4.6 contain an information exposure vulnerability | |
| 4731 | CVE-2025-43815 |
|
20.5th | 6.1 | A reflected cross-site scripting (XSS) vulnerability in Liferay Portal and DXP allows attackers to i | |
| 4732 | CVE-2025-34230 |
|
20.6th | 5.8 | This CVE describes a blind server-side request forgery (SSRF) vulnerability in Vasion Print (formerl | |
| 4733 | CVE-2025-34229 |
|
20.6th | 5.8 | This CVE describes a blind server-side request forgery (SSRF) vulnerability in Vasion Print (formerl | |
| 4734 | CVE-2025-11028 |
|
20.6th | 5.3 | This CVE-2025-11028 vulnerability in givanz Vvveb's Image Handler component allows remote attackers | |
| 4735 | CVE-2025-43779 |
|
20.5th | 6.1 | A reflected cross-site scripting vulnerability in Liferay Portal and DXP allows authenticated attack | |
| 4736 | CVE-2025-26514 |
|
20.6th | 6.4 | This is a reflected cross-site scripting (XSS) vulnerability in NetApp StorageGRID that allows attac | |
| 4737 | CVE-2024-43184 |
|
20.7th | 6.1 | This cross-site scripting (XSS) vulnerability in IBM Jazz Foundation allows unauthenticated attacker | |
| 4738 | CVE-2025-43830 |
|
20.5th | 6.1 | A stored cross-site scripting (XSS) vulnerability in Liferay Portal and DXP allows attackers to inje | |
| 4739 | CVE-2025-3448 |
|
20.5th | 6.1 | A reflected cross-site scripting (XSS) vulnerability in B&R Automation Runtime's System Diagnostics | |
| 4740 | CVE-2025-58586 |
|
20.6th | 5.3 | This vulnerability allows attackers to enumerate valid usernames by observing different error messag | |
| 4741 | CVE-2025-58580 |
|
20.6th | 6.5 | This vulnerability allows attackers to create arbitrary log entries via an unvalidated API endpoint. | |
| 4742 | CVE-2025-11999 |
|
20.6th | 5.3 | The Add Multiple Marker WordPress plugin has missing capability checks in two functions, allowing un | |
| 4743 | CVE-2025-62426 |
|
20.6th | 6.5 | This vulnerability in vLLM allows attackers to send specially crafted requests to the /v1/chat/compl | |
| 4744 | CVE-2025-55128 |
|
20.6th | 6.5 | An uncontrolled resource consumption vulnerability in userlog-index.php allows authenticated admin u | |
| 4745 | CVE-2025-13411 |
|
20.5th | 4.7 | This vulnerability in Campcodes Retro Basketball Shoes Online Store 1.0 allows attackers to upload a | |
| 4746 | CVE-2025-60728 |
|
20.7th | 4.3 | This vulnerability in Microsoft Office Excel involves an untrusted pointer dereference that could al | |
| 4747 | CVE-2025-21075 |
|
20.5th | 4.3 | This vulnerability is an out-of-bounds write in Samsung's libimagecodec.quram.so library that allows | |
| 4748 | CVE-2025-12898 |
|
20.6th | 5.3 | The Pretty Google Calendar WordPress plugin has an authentication bypass vulnerability that allows u | |
| 4749 | CVE-2025-12809 |
|
20.6th | 5.3 | The Dokan Pro WordPress plugin has a missing capability check on its wholesale registration REST API | |
| 4750 | CVE-2025-14674 |
|
20.6th | 6.3 | This vulnerability allows remote attackers to execute arbitrary code through injection in the QLExpr |
What is EPSS?
The Exploit Prediction Scoring System (EPSS) is a data-driven model developed by FIRST.org that estimates the probability a CVE will be exploited in the wild within the next 30 days. Unlike CVSS which measures severity, EPSS measures likelihood of exploitation — making it ideal for prioritizing which vulnerabilities to patch first.
Why EPSS matters: With thousands of CVEs published monthly, not all vulnerabilities are equally dangerous. EPSS helps security teams focus on the CVEs most likely to be actively exploited, rather than patching solely by CVSS score. A critical CVSS 9.8 vulnerability with 0.1% EPSS may be less urgent than a high CVSS 7.5 with 90% EPSS.
Prioritize by Exploit Risk
Scan your servers and see which vulnerabilities have the highest EPSS scores. Focus on what attackers are actually targeting.
Start Monitoring Free