Most Exploitable CVEs - EPSS Rankings

CVEs ranked by EPSS (Exploit Prediction Scoring System) probability. Higher scores mean a greater likelihood of exploitation in the wild within the next 30 days.

164
EPSS > 50%
156
CISA KEV Listed
35,468
CVEs with EPSS
0.7%
Avg EPSS Score
All Critical High Medium Low
Rank CVE ID EPSS Score Percentile CVSS Flags Summary
4801 CVE-2025-26970
0.24%
46.8th 10.0 This critical vulnerability allows unauthenticated attackers to execute arbitrary code on WordPress
4802 CVE-2018-15899
0.24%
47th 6.1 This is a cross-site scripting (XSS) vulnerability in MiniCMS 1.10 that allows attackers to inject m
4803 CVE-2025-53078
0.24%
46.8th 8.0 This vulnerability in Samsung DMS allows attackers to execute arbitrary code by exploiting insecure
4804 CVE-2023-38156
0.24%
46.8th 7.2 This vulnerability allows authenticated attackers to execute arbitrary SQL commands via JDBC injecti
4805 CVE-2025-40549
0.24%
47th 9.1 A path restriction bypass vulnerability in SolarWinds Serv-U allows administrators to execute code o
4806 CVE-2025-45379
0.24%
47th 8.4 This vulnerability allows a privileged user with known credentials to execute arbitrary commands thr
4807 CVE-2025-15276
0.24%
47th 7.8 This vulnerability allows remote attackers to execute arbitrary code by tricking users into opening
4808 CVE-2025-14224
0.24%
47th 4.3 A path traversal vulnerability in Yottamaster DM2, DM3, and DM200 NAS devices allows attackers to up
4809 CVE-2026-0650
0.24%
46.8th N/A OpenFlagr versions up to 1.1.18 contain an authentication bypass vulnerability in HTTP middleware. A
4810 CVE-2024-49333
0.24%
46.7th 8.5 This SQL injection vulnerability in the Hero Mega Menu WordPress plugin allows attackers to execute
4811 CVE-2024-49303
0.24%
46.7th 8.5 This SQL injection vulnerability in the Hero Mega Menu WordPress plugin allows attackers to execute
4812 CVE-2024-12370
0.24%
46.7th 5.3 The WP Hotel Booking plugin for WordPress has an authorization bypass vulnerability that allows unau
4813 CVE-2025-27139
0.24%
46.7th 6.8 This vulnerability allows attackers to inject malicious scripts into the preferences page of Combodo
4814 CVE-2024-46922
0.24%
46.7th 7.5 A null pointer dereference vulnerability in Samsung Exynos 1480 and 2400 mobile processors' Xclipse
4815 CVE-2024-52364
0.24%
46.7th 5.4 This CVE describes a cross-site scripting (XSS) vulnerability in IBM Cloud Pak for Business Automati
4816 CVE-2025-0755
0.24%
46.7th 8.4 A buffer overflow vulnerability in MongoDB's C driver library (libbson) allows attackers to cause se
4817 CVE-2025-2215
0.24%
46.7th 4.7 This critical vulnerability in Doufox allows remote attackers to perform path traversal attacks by m
4818 CVE-2025-27672
0.24%
46.7th 9.8 This vulnerability allows attackers to bypass OAuth authentication in Vasion Print (formerly Printer
4819 CVE-2025-3032
0.24%
46.7th 7.4 This vulnerability allows file descriptors from the fork server to leak into web content processes,
4820 CVE-2025-2875
0.24%
46.7th 7.5 This vulnerability allows unauthenticated attackers to manipulate a controller's webserver URL to ac
4821 CVE-2025-58371
0.24%
46.7th 9.8 CVE-2025-58371 is a critical vulnerability in Roo Code versions 3.26.6 and below that allows remote
4822 CVE-2025-68459
0.24%
46.7th 7.2 This vulnerability allows authenticated attackers to execute arbitrary operating system commands on
4823 CVE-2026-22792
0.24%
46.7th 9.6 This vulnerability allows attackers to inject malicious HTML that executes arbitrary JavaScript in t
4824 CVE-2024-13592
0.24%
46.6th 7.5 This vulnerability allows authenticated WordPress users with Contributor-level access or higher to p
4825 CVE-2025-30205
0.24%
46.6th 7.6 A vulnerability in kanidm-provision versions before 1.2.0 causes admin credentials to be leaked to s
4826 CVE-2025-2651
0.24%
46.6th 5.3 This vulnerability in SourceCodester Online Eyewear Shop 1.0 allows attackers to view directory list
4827 CVE-2024-9340
0.24%
46.7th 7.5 This CVE describes a Denial of Service vulnerability in zenml-io/zenml version 0.66.0 where unauthen
4828 CVE-2024-4990
0.24%
46.6th 9.1 This vulnerability in Yii2's Component class allows attackers to instantiate arbitrary classes and c
4829 CVE-2025-23387
0.24%
46.6th 5.3 This vulnerability allows unauthenticated attackers to list and delete CLI authentication tokens in
4830 CVE-2024-53298
0.24%
46.6th 9.8 Dell PowerScale OneFS versions 9.5.0.0 through 9.10.0.1 have a critical missing authorization vulner
4831 CVE-2025-5499
0.24%
46.6th 7.3 This critical vulnerability in slackero phpwcms allows remote attackers to execute arbitrary code th
4832 CVE-2025-9387
0.24%
46.6th 6.3 This CVE describes an OS command injection vulnerability in DCN DCME-720 web management backend. Att
4833 CVE-2025-36594
0.24%
46.6th 9.8 An authentication bypass vulnerability in Dell PowerProtect Data Domain allows unauthenticated remot
4834 CVE-2025-70084
0.24%
46.6th 7.5 A directory traversal vulnerability in OpenSatKit 2.2.1 allows attackers to access sensitive files o
4835 CVE-2025-7975
0.24%
46.6th 7.8 This vulnerability allows remote attackers to execute arbitrary code on Anritsu ShockLine systems by
4836 CVE-2025-6978
0.24%
46.6th 7.2 This CVE describes a command injection vulnerability in diagnostics functionality that allows attack
4837 CVE-2025-57130
0.24%
46.6th 8.3 An incorrect access control vulnerability in ZwiiCMS allows authenticated low-privilege users to esc
4838 CVE-2024-51738
0.24%
46.5th 8.1 Sunshine versions 0.23.1 and earlier have a pairing protocol vulnerability that allows man-in-the-mi
4839 CVE-2025-27399
0.24%
46.5th 5.3 Mastodon instances with domain block visibility set to 'users' (logged-in users) inadvertently expos
4840 CVE-2025-24072
0.24%
46.5th 7.8 CVE-2025-24072 is a use-after-free vulnerability in Microsoft's Local Security Authority Server (lsa
4841 CVE-2025-24050
0.24%
46.5th 7.8 CVE-2025-24050 is a heap-based buffer overflow vulnerability in Windows Hyper-V that allows an authe
4842 CVE-2025-24048
0.24%
46.5th 7.8 CVE-2025-24048 is a heap-based buffer overflow vulnerability in Windows Hyper-V that allows authenti
4843 CVE-2025-24046
0.24%
46.5th 7.8 CVE-2025-24046 is a use-after-free vulnerability in Microsoft Streaming Service that allows an authe
4844 CVE-2025-27434
0.24%
46.5th 8.8 CVE-2025-27434 is a cross-site scripting (XSS) vulnerability in SAP Commerce's Swagger UI component
4845 CVE-2025-4578
0.24%
46.5th 9.8 This vulnerability allows unauthenticated attackers to execute arbitrary SQL commands on WordPress s
4846 CVE-2025-8861
0.24%
46.5th 9.8 CVE-2025-8861 is a critical Missing Authentication vulnerability in TSA software developed by Changi
4847 CVE-2025-9575
0.24%
46.5th 6.3 This CVE describes a remote command injection vulnerability in multiple Linksys RE-series Wi-Fi rang
4848 CVE-2025-8830
0.24%
46.5th 6.3 This CVE describes a remote command injection vulnerability in multiple Linksys RE-series range exte
4849 CVE-2025-8829
0.24%
46.5th 6.3 This CVE describes a remote command injection vulnerability in Linksys RE series range extenders. At
4850 CVE-2025-8828
0.24%
46.5th 6.3 This CVE describes an OS command injection vulnerability in Linksys WiFi range extenders that allows

What is EPSS?

The Exploit Prediction Scoring System (EPSS) is a data-driven model developed by FIRST.org that estimates the probability a CVE will be exploited in the wild within the next 30 days. Unlike CVSS which measures severity, EPSS measures likelihood of exploitation — making it ideal for prioritizing which vulnerabilities to patch first.

Why EPSS matters: With thousands of CVEs published monthly, not all vulnerabilities are equally dangerous. EPSS helps security teams focus on the CVEs most likely to be actively exploited, rather than patching solely by CVSS score. A critical CVSS 9.8 vulnerability with 0.1% EPSS may be less urgent than a high CVSS 7.5 with 90% EPSS.

Prioritize by Exploit Risk

Scan your servers and see which vulnerabilities have the highest EPSS scores. Focus on what attackers are actually targeting.

Start Monitoring Free