Most Exploitable CVEs - EPSS Rankings
CVEs ranked by EPSS (Exploit Prediction Scoring System) probability. Higher scores mean a greater likelihood of exploitation in the wild within the next 30 days.
| Rank | CVE ID | EPSS Score | Percentile | CVSS | Flags | Summary |
|---|---|---|---|---|---|---|
| 4801 | CVE-2025-26970 |
|
46.8th | 10.0 | This critical vulnerability allows unauthenticated attackers to execute arbitrary code on WordPress | |
| 4802 | CVE-2018-15899 |
|
47th | 6.1 | This is a cross-site scripting (XSS) vulnerability in MiniCMS 1.10 that allows attackers to inject m | |
| 4803 | CVE-2025-53078 |
|
46.8th | 8.0 | This vulnerability in Samsung DMS allows attackers to execute arbitrary code by exploiting insecure | |
| 4804 | CVE-2023-38156 |
|
46.8th | 7.2 | This vulnerability allows authenticated attackers to execute arbitrary SQL commands via JDBC injecti | |
| 4805 | CVE-2025-40549 |
|
47th | 9.1 | A path restriction bypass vulnerability in SolarWinds Serv-U allows administrators to execute code o | |
| 4806 | CVE-2025-45379 |
|
47th | 8.4 | This vulnerability allows a privileged user with known credentials to execute arbitrary commands thr | |
| 4807 | CVE-2025-15276 |
|
47th | 7.8 | This vulnerability allows remote attackers to execute arbitrary code by tricking users into opening | |
| 4808 | CVE-2025-14224 |
|
47th | 4.3 | A path traversal vulnerability in Yottamaster DM2, DM3, and DM200 NAS devices allows attackers to up | |
| 4809 | CVE-2026-0650 |
|
46.8th | N/A | OpenFlagr versions up to 1.1.18 contain an authentication bypass vulnerability in HTTP middleware. A | |
| 4810 | CVE-2024-49333 |
|
46.7th | 8.5 | This SQL injection vulnerability in the Hero Mega Menu WordPress plugin allows attackers to execute | |
| 4811 | CVE-2024-49303 |
|
46.7th | 8.5 | This SQL injection vulnerability in the Hero Mega Menu WordPress plugin allows attackers to execute | |
| 4812 | CVE-2024-12370 |
|
46.7th | 5.3 | The WP Hotel Booking plugin for WordPress has an authorization bypass vulnerability that allows unau | |
| 4813 | CVE-2025-27139 |
|
46.7th | 6.8 | This vulnerability allows attackers to inject malicious scripts into the preferences page of Combodo | |
| 4814 | CVE-2024-46922 |
|
46.7th | 7.5 | A null pointer dereference vulnerability in Samsung Exynos 1480 and 2400 mobile processors' Xclipse | |
| 4815 | CVE-2024-52364 |
|
46.7th | 5.4 | This CVE describes a cross-site scripting (XSS) vulnerability in IBM Cloud Pak for Business Automati | |
| 4816 | CVE-2025-0755 |
|
46.7th | 8.4 | A buffer overflow vulnerability in MongoDB's C driver library (libbson) allows attackers to cause se | |
| 4817 | CVE-2025-2215 |
|
46.7th | 4.7 | This critical vulnerability in Doufox allows remote attackers to perform path traversal attacks by m | |
| 4818 | CVE-2025-27672 |
|
46.7th | 9.8 | This vulnerability allows attackers to bypass OAuth authentication in Vasion Print (formerly Printer | |
| 4819 | CVE-2025-3032 |
|
46.7th | 7.4 | This vulnerability allows file descriptors from the fork server to leak into web content processes, | |
| 4820 | CVE-2025-2875 |
|
46.7th | 7.5 | This vulnerability allows unauthenticated attackers to manipulate a controller's webserver URL to ac | |
| 4821 | CVE-2025-58371 |
|
46.7th | 9.8 | CVE-2025-58371 is a critical vulnerability in Roo Code versions 3.26.6 and below that allows remote | |
| 4822 | CVE-2025-68459 |
|
46.7th | 7.2 | This vulnerability allows authenticated attackers to execute arbitrary operating system commands on | |
| 4823 | CVE-2026-22792 |
|
46.7th | 9.6 | This vulnerability allows attackers to inject malicious HTML that executes arbitrary JavaScript in t | |
| 4824 | CVE-2024-13592 |
|
46.6th | 7.5 | This vulnerability allows authenticated WordPress users with Contributor-level access or higher to p | |
| 4825 | CVE-2025-30205 |
|
46.6th | 7.6 | A vulnerability in kanidm-provision versions before 1.2.0 causes admin credentials to be leaked to s | |
| 4826 | CVE-2025-2651 |
|
46.6th | 5.3 | This vulnerability in SourceCodester Online Eyewear Shop 1.0 allows attackers to view directory list | |
| 4827 | CVE-2024-9340 |
|
46.7th | 7.5 | This CVE describes a Denial of Service vulnerability in zenml-io/zenml version 0.66.0 where unauthen | |
| 4828 | CVE-2024-4990 |
|
46.6th | 9.1 | This vulnerability in Yii2's Component class allows attackers to instantiate arbitrary classes and c | |
| 4829 | CVE-2025-23387 |
|
46.6th | 5.3 | This vulnerability allows unauthenticated attackers to list and delete CLI authentication tokens in | |
| 4830 | CVE-2024-53298 |
|
46.6th | 9.8 | Dell PowerScale OneFS versions 9.5.0.0 through 9.10.0.1 have a critical missing authorization vulner | |
| 4831 | CVE-2025-5499 |
|
46.6th | 7.3 | This critical vulnerability in slackero phpwcms allows remote attackers to execute arbitrary code th | |
| 4832 | CVE-2025-9387 |
|
46.6th | 6.3 | This CVE describes an OS command injection vulnerability in DCN DCME-720 web management backend. Att | |
| 4833 | CVE-2025-36594 |
|
46.6th | 9.8 | An authentication bypass vulnerability in Dell PowerProtect Data Domain allows unauthenticated remot | |
| 4834 | CVE-2025-70084 |
|
46.6th | 7.5 | A directory traversal vulnerability in OpenSatKit 2.2.1 allows attackers to access sensitive files o | |
| 4835 | CVE-2025-7975 |
|
46.6th | 7.8 | This vulnerability allows remote attackers to execute arbitrary code on Anritsu ShockLine systems by | |
| 4836 | CVE-2025-6978 |
|
46.6th | 7.2 | This CVE describes a command injection vulnerability in diagnostics functionality that allows attack | |
| 4837 | CVE-2025-57130 |
|
46.6th | 8.3 | An incorrect access control vulnerability in ZwiiCMS allows authenticated low-privilege users to esc | |
| 4838 | CVE-2024-51738 |
|
46.5th | 8.1 | Sunshine versions 0.23.1 and earlier have a pairing protocol vulnerability that allows man-in-the-mi | |
| 4839 | CVE-2025-27399 |
|
46.5th | 5.3 | Mastodon instances with domain block visibility set to 'users' (logged-in users) inadvertently expos | |
| 4840 | CVE-2025-24072 |
|
46.5th | 7.8 | CVE-2025-24072 is a use-after-free vulnerability in Microsoft's Local Security Authority Server (lsa | |
| 4841 | CVE-2025-24050 |
|
46.5th | 7.8 | CVE-2025-24050 is a heap-based buffer overflow vulnerability in Windows Hyper-V that allows an authe | |
| 4842 | CVE-2025-24048 |
|
46.5th | 7.8 | CVE-2025-24048 is a heap-based buffer overflow vulnerability in Windows Hyper-V that allows authenti | |
| 4843 | CVE-2025-24046 |
|
46.5th | 7.8 | CVE-2025-24046 is a use-after-free vulnerability in Microsoft Streaming Service that allows an authe | |
| 4844 | CVE-2025-27434 |
|
46.5th | 8.8 | CVE-2025-27434 is a cross-site scripting (XSS) vulnerability in SAP Commerce's Swagger UI component | |
| 4845 | CVE-2025-4578 |
|
46.5th | 9.8 | This vulnerability allows unauthenticated attackers to execute arbitrary SQL commands on WordPress s | |
| 4846 | CVE-2025-8861 |
|
46.5th | 9.8 | CVE-2025-8861 is a critical Missing Authentication vulnerability in TSA software developed by Changi | |
| 4847 | CVE-2025-9575 |
|
46.5th | 6.3 | This CVE describes a remote command injection vulnerability in multiple Linksys RE-series Wi-Fi rang | |
| 4848 | CVE-2025-8830 |
|
46.5th | 6.3 | This CVE describes a remote command injection vulnerability in multiple Linksys RE-series range exte | |
| 4849 | CVE-2025-8829 |
|
46.5th | 6.3 | This CVE describes a remote command injection vulnerability in Linksys RE series range extenders. At | |
| 4850 | CVE-2025-8828 |
|
46.5th | 6.3 | This CVE describes an OS command injection vulnerability in Linksys WiFi range extenders that allows |
What is EPSS?
The Exploit Prediction Scoring System (EPSS) is a data-driven model developed by FIRST.org that estimates the probability a CVE will be exploited in the wild within the next 30 days. Unlike CVSS which measures severity, EPSS measures likelihood of exploitation — making it ideal for prioritizing which vulnerabilities to patch first.
Why EPSS matters: With thousands of CVEs published monthly, not all vulnerabilities are equally dangerous. EPSS helps security teams focus on the CVEs most likely to be actively exploited, rather than patching solely by CVSS score. A critical CVSS 9.8 vulnerability with 0.1% EPSS may be less urgent than a high CVSS 7.5 with 90% EPSS.
Prioritize by Exploit Risk
Scan your servers and see which vulnerabilities have the highest EPSS scores. Focus on what attackers are actually targeting.
Start Monitoring Free