Most Exploitable CVEs - EPSS Rankings
CVEs ranked by EPSS (Exploit Prediction Scoring System) probability. Higher scores mean a greater likelihood of exploitation in the wild within the next 30 days.
| Rank | CVE ID | EPSS Score | Percentile | CVSS | Flags | Summary |
|---|---|---|---|---|---|---|
| 4851 | CVE-2025-8821 |
|
46.5th | 6.3 | This CVE describes a command injection vulnerability in Linksys range extender firmware that allows | |
| 4852 | CVE-2025-55147 |
|
46.5th | 8.8 | This CVE describes a Cross-Site Request Forgery (CSRF) vulnerability in multiple Ivanti security pro | |
| 4853 | CVE-2022-50589 |
|
46.5th | 9.8 | This is a critical SQL injection vulnerability in SuiteCRM's export functionality that allows unauth | |
| 4854 | CVE-2025-23953 |
|
46.2th | 10.0 | This vulnerability allows attackers to upload arbitrary files, including web shells, to web servers | |
| 4855 | CVE-2025-21516 |
|
46.2th | 8.1 | This vulnerability in Oracle Customer Care allows authenticated attackers with low privileges to per | |
| 4856 | CVE-2025-21506 |
|
46.2th | 8.1 | This vulnerability in Oracle Project Foundation allows authenticated attackers with low privileges t | |
| 4857 | CVE-2024-57579 |
|
46.2th | 9.8 | This CVE describes a stack overflow vulnerability in Tenda AC18 routers that allows remote code exec | |
| 4858 | CVE-2024-40587 |
|
46.2th | 6.7 | This CVE describes an OS command injection vulnerability in Fortinet FortiVoice phone systems. Authe | |
| 4859 | CVE-2024-29970 |
|
46.2th | 9.8 | Fortanix Enclave OS has an interface vulnerability that allows attackers to inject signals, leading | |
| 4860 | CVE-2024-13285 |
|
46.2th | 9.8 | This vulnerability in Drupal's wkhtmltopdf module allows remote code execution through improper inpu | |
| 4861 | CVE-2025-22504 |
|
46.2th | 10.0 | This vulnerability allows attackers to upload arbitrary files, including web shells, to servers runn | |
| 4862 | CVE-2025-22364 |
|
46.2th | 7.5 | This vulnerability allows attackers to include local files on the server through improper filename c | |
| 4863 | CVE-2025-26979 |
|
46.2th | 7.5 | This vulnerability allows attackers to include local files on the server through improper filename c | |
| 4864 | CVE-2025-26615 |
|
46.2th | 10.0 | A path traversal vulnerability in WeGIA's examples.php endpoint allows attackers to read the config. | |
| 4865 | CVE-2025-0821 |
|
46.2th | 6.5 | The Bit Assist WordPress plugin contains a time-based SQL injection vulnerability in all versions up | |
| 4866 | CVE-2021-27017 |
|
46.3th | 6.6 | CVE-2021-27017 is a deserialization vulnerability in Puppet Agent that allows attackers to execute a | |
| 4867 | CVE-2025-25141 |
|
46.2th | 7.5 | This vulnerability allows attackers to include local files on the server through improper filename c | |
| 4868 | CVE-2024-36554 |
|
46.2th | 9.8 | This vulnerability in Forever KidsWatch smartwatches allows attackers to remotely extract sensitive | |
| 4869 | CVE-2025-0859 |
|
46.2th | 6.5 | This vulnerability in the BoldGrid Post and Page Builder WordPress plugin allows authenticated attac | |
| 4870 | CVE-2025-1022 |
|
46.2th | 8.2 | This vulnerability in spatie/browsershot allows attackers to bypass file URI scheme validation by om | |
| 4871 | CVE-2025-29928 |
|
46.2th | 8.0 | authentik versions prior to 2024.12.4 and 2025.2.3 have a session management vulnerability when conf | |
| 4872 | CVE-2025-32993 |
|
46.2th | 6.5 | CVE-2025-32993 is a time-based blind SQL injection vulnerability in Vision Helpdesk's forgot passwor | |
| 4873 | CVE-2025-29831 |
|
46.2th | 7.5 | CVE-2025-29831 is a use-after-free vulnerability in Microsoft's Remote Desktop Gateway Service that | |
| 4874 | CVE-2025-47957 |
|
46.2th | 8.4 | This vulnerability is a use-after-free memory corruption flaw in Microsoft Office Word that allows a | |
| 4875 | CVE-2025-6380 |
|
46.2th | 9.8 | This vulnerability in the ONLYOFFICE Docs WordPress plugin allows unauthenticated attackers to escal | |
| 4876 | CVE-2025-7083 |
|
46.2th | 6.3 | This critical vulnerability in Belkin F9K1122 routers allows remote attackers to execute arbitrary o | |
| 4877 | CVE-2025-57810 |
|
46.2th | 7.5 | CVE-2025-57810 is a denial-of-service vulnerability in jsPDF library where user-controlled input to | |
| 4878 | CVE-2025-10057 |
|
46.3th | 8.8 | This vulnerability allows authenticated attackers with Subscriber-level access or higher to execute | |
| 4879 | CVE-2025-9990 |
|
46.3th | 8.1 | The WordPress Helpdesk Integration plugin has a Local File Inclusion vulnerability that allows unaut | |
| 4880 | CVE-2025-60710 |
|
46.2th | 7.8 | This vulnerability allows an authorized attacker to exploit improper link resolution in the Host Pro | |
| 4881 | CVE-2025-66572 |
|
46.2th | N/A | Loaded Commerce 6.6 contains a client-side template injection vulnerability that allows unauthentica | |
| 4882 | CVE-2025-23367 |
|
46th | 6.5 | This vulnerability allows users with Monitor or Auditor roles in Wildfly Server to suspend or resume | |
| 4883 | CVE-2024-13694 |
|
46th | 7.5 | This vulnerability allows unauthenticated attackers to access wishlist data they shouldn't have perm | |
| 4884 | CVE-2025-1355 |
|
46th | 7.3 | This critical vulnerability in needyamin Library Card System 1.0 allows attackers to upload arbitrar | |
| 4885 | CVE-2024-57077 |
|
46.2th | 9.1 | CVE-2024-57077 is a prototype pollution vulnerability in utils-extend library version 1.0.8 that all | |
| 4886 | CVE-2025-2322 |
|
46th | 7.3 | This CVE describes a critical vulnerability in a Spring Boot ChatGPT integration component where har | |
| 4887 | CVE-2025-2320 |
|
46th | 7.3 | This CVE describes an improper authorization vulnerability in the springboot-openai-chatgpt project' | |
| 4888 | CVE-2025-23368 |
|
46th | 8.1 | This vulnerability in WildFly Elytron integration allows attackers to perform brute force attacks ag | |
| 4889 | CVE-2025-30704 |
|
46th | 4.4 | A vulnerability in Oracle MySQL Server's Components Services allows high-privileged attackers with n | |
| 4890 | CVE-2025-3352 |
|
46th | 7.3 | This critical SQL injection vulnerability in PHPGurukul Old Age Home Management System 1.0 allows at | |
| 4891 | CVE-2025-48742 |
|
46th | 5.4 | This vulnerability in SIGB PMB installer allows remote attackers to execute arbitrary code on affect | |
| 4892 | CVE-2025-2605 |
|
46th | 9.9 | This OS command injection vulnerability in Honeywell MB-Secure allows attackers to execute arbitrary | |
| 4893 | CVE-2025-49832 |
|
46th | 6.5 | Asterisk has a vulnerability in its STIR/SHAKEN verification module that allows remote attackers to | |
| 4894 | CVE-2025-43813 |
|
46th | 8.2 | This vulnerability in Liferay Portal/DXP allows remote attackers to perform path traversal attacks v | |
| 4895 | CVE-2025-10589 |
|
46th | 8.8 | This CVE describes an OS command injection vulnerability in N-Partner's N-Reporter, N-Cloud, and N-P | |
| 4896 | CVE-2025-3586 |
|
46th | 7.2 | This vulnerability allows authenticated admin users with Instance Administrator role to execute arbi | |
| 4897 | CVE-2025-65036 |
|
46.1th | 8.3 | CVE-2025-65036 is a critical vulnerability in XWiki Remote Macros that allows unauthenticated attack | |
| 4898 | CVE-2025-0615 |
|
46th | 5.3 | This input validation vulnerability in Qualifio's Wheel of Fortune allows attackers to bypass email | |
| 4899 | CVE-2023-37936 |
|
46th | 9.8 | This vulnerability allows attackers to execute arbitrary code or commands on affected FortiSwitch de | |
| 4900 | CVE-2023-46608 |
|
45.9th | 5.3 | This CVE describes a Missing Authorization vulnerability in the WPDO DoLogin Security WordPress plug |
What is EPSS?
The Exploit Prediction Scoring System (EPSS) is a data-driven model developed by FIRST.org that estimates the probability a CVE will be exploited in the wild within the next 30 days. Unlike CVSS which measures severity, EPSS measures likelihood of exploitation — making it ideal for prioritizing which vulnerabilities to patch first.
Why EPSS matters: With thousands of CVEs published monthly, not all vulnerabilities are equally dangerous. EPSS helps security teams focus on the CVEs most likely to be actively exploited, rather than patching solely by CVSS score. A critical CVSS 9.8 vulnerability with 0.1% EPSS may be less urgent than a high CVSS 7.5 with 90% EPSS.
Prioritize by Exploit Risk
Scan your servers and see which vulnerabilities have the highest EPSS scores. Focus on what attackers are actually targeting.
Start Monitoring Free