Most Exploitable CVEs - EPSS Rankings
CVEs ranked by EPSS (Exploit Prediction Scoring System) probability. Higher scores mean a greater likelihood of exploitation in the wild within the next 30 days.
| Rank | CVE ID | EPSS Score | Percentile | CVSS | Flags | Summary |
|---|---|---|---|---|---|---|
| 4751 | CVE-2024-2356 |
|
47.2th | 9.6 | This CVE describes a Local File Inclusion vulnerability in the lollms-webui application that allows | |
| 4752 | CVE-2025-23938 |
|
47.2th | 7.5 | This vulnerability allows attackers to include local files on the server through improper filename c | |
| 4753 | CVE-2025-23915 |
|
47.2th | 7.5 | This CVE describes a PHP Local File Inclusion vulnerability in the FAT Event Lite WordPress plugin, | |
| 4754 | CVE-2024-47239 |
|
47.2th | 6.5 | Dell PowerScale OneFS versions 8.2.2.x through 9.9.0.0 contain an uncontrolled resource consumption | |
| 4755 | CVE-2025-26957 |
|
47.2th | 7.5 | This vulnerability allows attackers to include local files on the server through the Affiliate Coupo | |
| 4756 | CVE-2025-26932 |
|
47.2th | 7.5 | This CVE describes a PHP Local File Inclusion vulnerability in QuantumCloud ChatBot WordPress plugin | |
| 4757 | CVE-2025-1674 |
|
47.2th | 8.2 | CVE-2025-1674 is an out-of-bounds read vulnerability in Zephyr RTOS caused by insufficient input val | |
| 4758 | CVE-2025-27272 |
|
47.2th | 7.5 | This vulnerability allows attackers to include local files on the server through improper filename c | |
| 4759 | CVE-2025-26370 |
|
47.2th | 7.1 | This vulnerability allows authenticated low-privileged attackers to remove privileges from user grou | |
| 4760 | CVE-2025-26350 |
|
47.2th | 4.9 | This vulnerability allows authenticated remote attackers to upload malicious files to Q-Free MaxTime | |
| 4761 | CVE-2025-29509 |
|
47.2th | 8.8 | CVE-2025-29509 is a remote code execution vulnerability in Jan AI desktop application versions 0.5.1 | |
| 4762 | CVE-2025-6087 |
|
47.2th | 9.1 | A Server-Side Request Forgery (SSRF) vulnerability in the @opennextjs/cloudflare package allows unau | |
| 4763 | CVE-2025-37095 |
|
47.2th | 9.8 | A directory traversal vulnerability in HPE StoreOnce Software allows attackers to access sensitive f | |
| 4764 | CVE-2025-6507 |
|
47.1th | 9.8 | This vulnerability in h2o-3 allows attackers to bypass regex filters in JDBC connections by manipula | |
| 4765 | CVE-2025-11939 |
|
47.2th | 4.7 | This vulnerability in ChurchCRM allows attackers to perform path traversal attacks via the restoreFi | |
| 4766 | CVE-2025-10611 |
|
47.2th | 9.8 | This critical vulnerability in WSO2 products allows attackers to bypass authentication and authoriza | |
| 4767 | CVE-2025-34239 |
|
47.1th | 7.2 | This vulnerability allows authenticated system administrators in Advantech WebAccess/VPN to execute | |
| 4768 | CVE-2025-69211 |
|
47.2th | 7.4 | NestJS applications using Fastify platform with route-specific middleware are vulnerable to URL enco | |
| 4769 | CVE-2025-11783 |
|
47.1th | 9.8 | A stack-based buffer overflow vulnerability in Circutor SGE-PLC1000/SGE-PLC50 v9.0.2 allows remote a | |
| 4770 | CVE-2025-14844 |
|
47.2th | 8.2 | This vulnerability allows unauthenticated attackers to access Stripe SetupIntent client_secret value | |
| 4771 | CVE-2025-69971 |
|
47.2th | 9.8 | FUXA v1.2.7 contains a hard-coded JWT secret key that allows attackers to forge valid authentication | |
| 4772 | CVE-2025-21599 |
|
47.1th | 7.5 | This CVE describes a memory leak vulnerability in Juniper's Tunnel Driver (jtd) on Junos OS Evolved. | |
| 4773 | CVE-2024-12030 |
|
47.1th | 6.5 | This SQL injection vulnerability in the MDTF WordPress plugin allows authenticated attackers with Co | |
| 4774 | CVE-2025-22390 |
|
47th | 7.5 | This vulnerability allows attackers to compromise user accounts through password attacks due to weak | |
| 4775 | CVE-2025-0767 |
|
47.1th | 9.8 | CVE-2025-0767 is a PHP object injection vulnerability in WP Activity Log plugin that allows remote c | |
| 4776 | CVE-2025-28009 |
|
47.1th | 9.8 | A SQL injection vulnerability in Dietiqa App v1.0.20 allows attackers to execute arbitrary SQL comma | |
| 4777 | CVE-2025-32626 |
|
47.1th | 9.3 | This SQL injection vulnerability in JoomSky JS Job Manager allows attackers to execute arbitrary SQL | |
| 4778 | CVE-2025-22930 |
|
47.1th | 9.8 | This SQL injection vulnerability in OS4ED openSIS allows attackers to execute arbitrary SQL commands | |
| 4779 | CVE-2025-30886 |
|
47.1th | 9.3 | This SQL injection vulnerability in JoomSky JS Help Desk allows attackers to execute arbitrary SQL c | |
| 4780 | CVE-2025-5156 |
|
47.1th | 8.8 | A critical buffer overflow vulnerability in H3C GR-5400AX routers allows remote attackers to execute | |
| 4781 | CVE-2025-4835 |
|
47.1th | 8.8 | This critical buffer overflow vulnerability in TOTOLINK routers allows remote attackers to execute a | |
| 4782 | CVE-2025-4834 |
|
47.1th | 8.8 | This critical buffer overflow vulnerability in TOTOLINK routers allows remote attackers to execute a | |
| 4783 | CVE-2025-4832 |
|
47.1th | 8.8 | This critical buffer overflow vulnerability in TOTOLINK routers allows remote attackers to execute a | |
| 4784 | CVE-2025-51087 |
|
47.1th | 8.6 | This vulnerability allows remote attackers to execute arbitrary code on Tenda AC8V4 routers by explo | |
| 4785 | CVE-2025-7624 |
|
47th | 9.8 | An SQL injection vulnerability in Sophos Firewall's legacy SMTP proxy allows remote attackers to exe | |
| 4786 | CVE-2025-45479 |
|
47.1th | 9.8 | This vulnerability allows attackers to execute arbitrary code on educoder challenge containers by in | |
| 4787 | CVE-2025-3626 |
|
47.1th | 9.1 | This critical vulnerability allows remote attackers with administrator credentials to execute arbitr | |
| 4788 | CVE-2023-36881 |
|
47.1th | 4.5 | CVE-2023-36881 is a cross-site scripting (XSS) vulnerability in Azure Apache Ambari that allows atta | |
| 4789 | CVE-2026-1560 |
|
47.1th | 8.8 | This vulnerability in the Lazy Blocks WordPress plugin allows authenticated attackers with Contribut | |
| 4790 | CVE-2023-53776 |
|
47.1th | 8.8 | This authentication bypass vulnerability in Screen SFT DAB 1.9.3 allows attackers to reuse IP-bound | |
| 4791 | CVE-2023-53734 |
|
47.1th | N/A | CVE-2023-53734 is an unauthenticated SQL injection vulnerability in dawa-pharma-1.0 pharmacy billing | |
| 4792 | CVE-2025-0570 |
|
47th | 6.5 | This vulnerability allows authenticated remote attackers to cause denial-of-service conditions on Sa | |
| 4793 | CVE-2025-0612 |
|
47th | 7.5 | This vulnerability allows remote attackers to trigger out-of-bounds memory access in Chrome's V8 Jav | |
| 4794 | CVE-2024-46667 |
|
47th | 7.5 | This vulnerability in Fortinet FortiSIEM allows attackers to cause denial of service by consuming al | |
| 4795 | CVE-2024-11864 |
|
47th | 7.5 | CVE-2024-11864 is a vulnerability in SCP-Firmware where specially crafted SCMI messages can cause a | |
| 4796 | CVE-2024-53544 |
|
47th | 9.8 | This SQL injection vulnerability in NovaCHRON Smart Time Plus allows attackers to execute arbitrary | |
| 4797 | CVE-2024-23814 |
|
47th | 5.3 | This vulnerability allows unauthenticated remote attackers to cause a temporary denial of service in | |
| 4798 | CVE-2024-39564 |
|
47th | 7.5 | A double-free vulnerability in Juniper Junos OS and Junos OS Evolved routing process daemon (rpd) al | |
| 4799 | CVE-2024-8248 |
|
47th | 7.2 | A path traversal vulnerability in the normalizePath function of mintplex-labs/anything-llm allows at | |
| 4800 | CVE-2025-26936 |
|
46.8th | 10.0 | This critical vulnerability in the Fresh Framework WordPress plugin allows unauthenticated attackers |
What is EPSS?
The Exploit Prediction Scoring System (EPSS) is a data-driven model developed by FIRST.org that estimates the probability a CVE will be exploited in the wild within the next 30 days. Unlike CVSS which measures severity, EPSS measures likelihood of exploitation — making it ideal for prioritizing which vulnerabilities to patch first.
Why EPSS matters: With thousands of CVEs published monthly, not all vulnerabilities are equally dangerous. EPSS helps security teams focus on the CVEs most likely to be actively exploited, rather than patching solely by CVSS score. A critical CVSS 9.8 vulnerability with 0.1% EPSS may be less urgent than a high CVSS 7.5 with 90% EPSS.
Prioritize by Exploit Risk
Scan your servers and see which vulnerabilities have the highest EPSS scores. Focus on what attackers are actually targeting.
Start Monitoring Free