Most Exploitable CVEs - EPSS Rankings
CVEs ranked by EPSS (Exploit Prediction Scoring System) probability. Higher scores mean a greater likelihood of exploitation in the wild within the next 30 days.
| Rank | CVE ID | EPSS Score | Percentile | CVSS | Flags | Summary |
|---|---|---|---|---|---|---|
| 4851 | CVE-2025-20367 |
|
20.4th | 5.7 | This is a cross-site scripting (XSS) vulnerability in Splunk Enterprise and Splunk Cloud Platform th | |
| 4852 | CVE-2025-20356 |
|
20.4th | 5.4 | An authenticated cross-site scripting (XSS) vulnerability in Cisco Cyber Vision Center's web managem | |
| 4853 | CVE-2025-11427 |
|
20.4th | 5.8 | The WP Migrate Lite plugin for WordPress has a blind SSRF vulnerability that allows unauthenticated | |
| 4854 | CVE-2025-9075 |
|
20.3th | 6.4 | The ZoloBlocks WordPress plugin has a stored cross-site scripting vulnerability that allows authenti | |
| 4855 | CVE-2025-63498 |
|
20.5th | 6.1 | CVE-2025-63498 is a cross-site scripting (XSS) vulnerability in alinto SOGo 5.12.3 that allows attac | |
| 4856 | CVE-2025-13564 |
|
20.5th | 5.4 | CVE-2025-13564 is an arbitrary file deletion vulnerability in SourceCodester Pre-School Management S | |
| 4857 | CVE-2025-13468 |
|
20.4th | 5.4 | This vulnerability allows unauthorized deletion of forum posts, careers, comments, gallery items, an | |
| 4858 | CVE-2025-63708 |
|
20.4th | 6.1 | A Cross-Site Scripting (XSS) vulnerability in SourceCodester AI Font Matcher allows attackers to inj | |
| 4859 | CVE-2025-64433 |
|
20.4th | 6.5 | This vulnerability in KubeVirt allows a malicious user with control over a PersistentVolumeClaim (PV | |
| 4860 | CVE-2025-43501 |
|
20.2th | 4.3 | A buffer overflow vulnerability in Apple's Safari browser and related operating systems allows attac | |
| 4861 | CVE-2022-46845 |
|
20.2th | 5.3 | This vulnerability allows attackers to bypass authorization controls in the Slider a SlidersPack Wor | |
| 4862 | CVE-2025-14146 |
|
20.4th | 5.3 | The Booking Calendar WordPress plugin exposes sensitive booking data to unauthenticated attackers du | |
| 4863 | CVE-2026-21857 |
|
20.3th | 6.5 | This vulnerability allows authenticated REDAXO users with backup permissions to read arbitrary files | |
| 4864 | CVE-2025-15453 |
|
20.2th | 6.3 | This vulnerability in Milvus allows remote attackers to execute arbitrary code through deserializati | |
| 4865 | CVE-2026-1112 |
|
20.5th | 5.4 | This CVE describes an improper authorization vulnerability in Sanluan PublicCMS's trade address dele | |
| 4866 | CVE-2025-20941 |
|
20.2th | 6.2 | This vulnerability allows local attackers to access scancode data from specific input devices due to | |
| 4867 | CVE-2024-35148 |
|
20.1th | 6.3 | This SQL injection vulnerability in IBM Maximo Application Suite's Monitor Component allows remote a | |
| 4868 | CVE-2024-13551 |
|
20.2th | 6.4 | The ABC Notation WordPress plugin has a stored cross-site scripting vulnerability that allows authen | |
| 4869 | CVE-2024-56914 |
|
20th | 5.7 | A buffer overflow vulnerability exists in the D-Link DSL-3782 router's Parental Control web interfac | |
| 4870 | CVE-2023-23913 |
|
20.1th | 6.3 | This DOM-based cross-site scripting vulnerability in rails-ujs allows attackers to inject malicious | |
| 4871 | CVE-2024-12431 |
|
20th | 4.3 | This vulnerability allows unauthorized users to manipulate the status of issues in public GitLab pro | |
| 4872 | CVE-2024-33055 |
|
20.2th | 6.7 | This vulnerability allows attackers to cause memory corruption by making specific IOCTL calls to unm | |
| 4873 | CVE-2024-55897 |
|
20.2th | 4.3 | IBM PowerHA SystemMirror for i fails to set the secure attribute on authorization tokens and session | |
| 4874 | CVE-2024-13379 |
|
20th | 6.4 | The C9 Admin Dashboard WordPress plugin up to version 1.3.5 allows authenticated attackers with Auth | |
| 4875 | CVE-2025-1076 |
|
20.2th | 4.8 | A stored XSS vulnerability in Holded's Activities functionality allows attackers to inject malicious | |
| 4876 | CVE-2023-53028 |
|
20th | 5.5 | This CVE describes a double-free vulnerability in the Linux kernel's WiFi subsystem (mac80211) that | |
| 4877 | CVE-2023-52991 |
|
20th | 5.5 | A NULL pointer dereference vulnerability in the Linux kernel's network stack can cause kernel panic | |
| 4878 | CVE-2023-52929 |
|
20th | 5.5 | This CVE describes a memory leak vulnerability in the Linux kernel's nvmem (non-volatile memory) sub | |
| 4879 | CVE-2025-21868 |
|
20th | 5.5 | A Linux kernel vulnerability where improper memory allocation handling when MAX_SKB_FRAGS is set to | |
| 4880 | CVE-2025-0149 |
|
20th | 6.5 | This vulnerability in Zoom Workplace Apps allows unprivileged users to cause denial of service attac | |
| 4881 | CVE-2025-22091 |
|
20th | 5.5 | This CVE describes an integer overflow vulnerability in the Linux kernel's RDMA/mlx5 driver when reg | |
| 4882 | CVE-2025-22084 |
|
20th | 5.5 | A race condition in the Linux kernel's w1 (1-Wire) subsystem can cause a NULL pointer dereference wh | |
| 4883 | CVE-2025-22047 |
|
20.2th | 5.5 | This CVE involves a logic error in the Linux kernel's AMD microcode update function where a failed S | |
| 4884 | CVE-2025-22034 |
|
20th | 5.5 | A Linux kernel vulnerability in the memory management subsystem allows device-exclusive memory entri | |
| 4885 | CVE-2025-22032 |
|
20th | 5.5 | This CVE describes a null pointer dereference vulnerability in the Linux kernel's MediaTek MT7921 Wi | |
| 4886 | CVE-2025-22026 |
|
20th | 5.5 | This CVE-2025-22026 is a Linux kernel vulnerability in the NFS server (nfsd) where error handling is | |
| 4887 | CVE-2025-22024 |
|
20th | 5.5 | A use-after-free vulnerability in the Linux kernel's NFS server (nfsd) allows a root user to trigger | |
| 4888 | CVE-2025-30655 |
|
20.2th | 5.5 | A local privilege escalation vulnerability in Juniper Junos OS and Junos OS Evolved allows low-privi | |
| 4889 | CVE-2025-22001 |
|
20th | 5.5 | This CVE describes an integer overflow vulnerability in the Linux kernel's QAIC (Qualcomm AI Compute | |
| 4890 | CVE-2025-21995 |
|
20th | 5.5 | This CVE describes a fence reference count leak vulnerability in the Linux kernel's DRM scheduler co | |
| 4891 | CVE-2025-21894 |
|
20th | 5.5 | A vulnerability in the Linux kernel's ENETC network driver allows Virtual Functions (VFs) to attempt | |
| 4892 | CVE-2024-22653 |
|
20th | 4.8 | This CVE describes a NULL pointer dereference vulnerability in Yasm, an assembler used for compiling | |
| 4893 | CVE-2025-4683 |
|
20.1th | 4.3 | The MStore API WordPress plugin has an authorization vulnerability that allows authenticated users w | |
| 4894 | CVE-2025-3939 |
|
20th | 5.3 | This CVE describes an Observable Response Discrepancy vulnerability in Tridium Niagara Framework and | |
| 4895 | CVE-2024-52601 |
|
20th | 6.5 | This vulnerability in iTop allows authenticated users with portal access to view objects they should | |
| 4896 | CVE-2025-30507 |
|
20.1th | 5.3 | CVE-2025-30507 is a blind SQL injection vulnerability in CyberData 011209 Intercom devices that allo | |
| 4897 | CVE-2025-44172 |
|
20.2th | 6.5 | This vulnerability allows remote attackers to execute arbitrary code on Tenda AC6 routers by exploit | |
| 4898 | CVE-2025-5437 |
|
20.1th | 5.3 | This critical vulnerability in Multilaser Sirius RE016 routers allows attackers to bypass authentica | |
| 4899 | CVE-2024-53288 |
|
20th | 5.9 | This is a stored cross-site scripting (XSS) vulnerability in Synology Router Manager's NTP Region fu | |
| 4900 | CVE-2025-53889 |
|
20.1th | 6.5 | Directus versions 9.12.0 through 11.8.0 have an authentication bypass vulnerability in manual trigge |
What is EPSS?
The Exploit Prediction Scoring System (EPSS) is a data-driven model developed by FIRST.org that estimates the probability a CVE will be exploited in the wild within the next 30 days. Unlike CVSS which measures severity, EPSS measures likelihood of exploitation — making it ideal for prioritizing which vulnerabilities to patch first.
Why EPSS matters: With thousands of CVEs published monthly, not all vulnerabilities are equally dangerous. EPSS helps security teams focus on the CVEs most likely to be actively exploited, rather than patching solely by CVSS score. A critical CVSS 9.8 vulnerability with 0.1% EPSS may be less urgent than a high CVSS 7.5 with 90% EPSS.
Prioritize by Exploit Risk
Scan your servers and see which vulnerabilities have the highest EPSS scores. Focus on what attackers are actually targeting.
Start Monitoring Free