Most Exploitable CVEs - EPSS Rankings
CVEs ranked by EPSS (Exploit Prediction Scoring System) probability. Higher scores mean a greater likelihood of exploitation in the wild within the next 30 days.
| Rank | CVE ID | EPSS Score | Percentile | CVSS | Flags | Summary |
|---|---|---|---|---|---|---|
| 1 | CVE-2024-48248 |
|
99.9th | 8.6 | KEV | CVE-2024-48248 is an absolute path traversal vulnerability in NAKIVO Backup & Replication that allow |
| 2 | CVE-2024-12849 |
|
99.7th | 7.5 | The Error Log Viewer By WP Guru WordPress plugin contains an unauthenticated arbitrary file read vul | |
| 3 | CVE-2025-3102 |
|
99.4th | 8.1 | The SureTriggers WordPress plugin has an authentication bypass vulnerability that allows unauthentic | |
| 4 | CVE-2025-30066 |
|
99.4th | 8.6 | KEV | CVE-2025-30066 is a supply chain attack where malicious commits were injected into the tj-actions/ch |
| 5 | CVE-2024-36597 |
|
99.4th | 8.8 | Aegon Life v1.0 Life Insurance Management System contains a SQL injection vulnerability in the clien | |
| 6 | CVE-2025-2563 |
|
99.3th | 8.1 | The User Registration & Membership WordPress plugin before version 4.1.2 contains a privilege escala | |
| 7 | CVE-2025-21293 |
|
99th | 8.8 | This vulnerability allows attackers to elevate privileges in Active Directory Domain Services, poten | |
| 8 | CVE-2025-30004 |
|
99th | 8.8 | Xorcom CompletePBX versions up to 5.2.35 contain an authenticated command injection vulnerability in | |
| 9 | CVE-2025-0994 |
|
99th | 8.8 | KEV | This vulnerability allows authenticated users to execute arbitrary code on Trimble Cityworks servers |
| 10 | CVE-2025-5777 |
|
99th | 7.5 | KEV | CVE-2025-5777 (CitrixBleed 2) is a memory disclosure vulnerability in Citrix NetScaler ADC and Gatew |
| 11 | CVE-2025-1232 |
|
98.9th | 8.8 | This vulnerability in the Site Reviews WordPress plugin allows unauthenticated attackers to inject m | |
| 12 | CVE-2025-27363 |
|
98.9th | 8.1 | KEV | This CVE describes an out-of-bounds write vulnerability in FreeType versions 2.13.0 and below when p |
| 13 | CVE-2024-48456 |
|
98.9th | 7.5 | This vulnerability allows a remote attacker to obtain sensitive information, specifically the admin | |
| 14 | CVE-2024-12971 |
|
98.8th | 8.8 | This CVE allows attackers to execute arbitrary operating system commands on Pandora FMS servers by i | |
| 15 | CVE-2013-10061 |
|
98.8th | 7.2 | This CVE describes an authenticated OS command injection vulnerability in Netgear DGN1000B routers t | |
| 16 | CVE-2025-21333 |
|
98.7th | 7.8 | KEV | This vulnerability allows a local authenticated attacker to escalate privileges on Windows Hyper-V h |
| 17 | CVE-2024-6842 |
|
98.7th | 7.5 | This vulnerability allows unauthenticated attackers to access the /setup-complete API endpoint in An | |
| 18 | CVE-2025-26794 |
|
98.7th | 7.5 | Exim mail servers running versions 4.98 before 4.98.1 with SQLite hints and ETRN serialization enabl | |
| 19 | CVE-2025-13316 |
|
98.7th | 8.1 | CVE-2025-13316 is a cryptographic vulnerability in Twonky Server 8.5.2 where hard-coded encryption k | |
| 20 | CVE-2025-60787 |
|
98.6th | 7.2 | MotionEye v0.43.1b4 and earlier contains an OS command injection vulnerability where authenticated a | |
| 21 | CVE-2024-46981 |
|
98.6th | 7.0 | This CVE describes a use-after-free vulnerability in Redis where an authenticated user can craft a m | |
| 22 | CVE-2025-49704 |
|
98.6th | 8.8 | KEV | This CVE describes a code injection vulnerability in Microsoft Office SharePoint that allows authent |
| 23 | CVE-2023-52163 |
|
98.6th | 8.8 | KEV | This vulnerability allows remote attackers to execute arbitrary commands on Digiever DS-2105 Pro dev |
| 24 | CVE-2025-40536 |
|
98.6th | 8.1 | KEV | SolarWinds Web Help Desk contains a security control bypass vulnerability that allows unauthenticate |
| 25 | CVE-2025-11371 |
|
98.6th | 7.5 | KEV | An unauthenticated Local File Inclusion vulnerability in Gladinet CentreStack and TrioFox allows att |
| 26 | CVE-2024-42845 |
|
98.4th | 8.0 | This CVE describes an eval injection vulnerability in InVesalius's DICOM file reader that allows att | |
| 27 | CVE-2023-4911 |
|
98.4th | 7.8 | KEV | CVE-2023-4911 is a buffer overflow vulnerability in the GNU C Library's dynamic loader (ld.so) that |
| 28 | CVE-2013-10050 |
|
98.3th | 8.8 | This CVE describes an authenticated OS command injection vulnerability in multiple D-Link router mod | |
| 29 | CVE-2025-34026 |
|
98.2th | 7.5 | KEV | This CVE describes an authentication bypass vulnerability in the Versa Concerto SD-WAN orchestration |
| 30 | CVE-2025-20029 |
|
98.1th | 8.8 | This command injection vulnerability in F5 BIG-IP's iControl REST API and tmsh save command allows a | |
| 31 | CVE-2025-49619 |
|
98.1th | 8.5 | Skyvern versions through 0.1.85 have a server-side template injection vulnerability in workflow bloc | |
| 32 | CVE-2025-11700 |
|
98.1th | 7.5 | N-central versions before 2025.4 are vulnerable to XML External Entity (XXE) injection attacks, allo | |
| 33 | CVE-2025-14847 |
|
98.1th | 7.5 | KEV | This vulnerability allows unauthenticated clients to read uninitialized heap memory from MongoDB ser |
| 34 | CVE-2024-20154 |
|
98.1th | 8.8 | This vulnerability allows remote code execution on affected mobile devices when they connect to a ma | |
| 35 | CVE-2025-4428 |
|
98.1th | 7.2 | KEV | This vulnerability allows authenticated attackers to execute arbitrary code on Ivanti Endpoint Manag |
| 36 | CVE-2013-10032 |
|
98.1th | 8.8 | This CVE describes an authenticated remote code execution vulnerability in GetSimpleCMS 3.2.1 where | |
| 37 | CVE-2020-36848 |
|
98th | 7.5 | The Total Upkeep WordPress backup plugin exposes sensitive information through publicly accessible f | |
| 38 | CVE-2025-24367 |
|
98th | 8.8 | An authenticated Cacti user can abuse graph creation functionality to write arbitrary PHP files to t | |
| 39 | CVE-2005-10004 |
|
97.9th | 8.8 | This vulnerability allows authenticated users to execute arbitrary shell commands on Cacti servers t | |
| 40 | CVE-2025-1098 |
|
97.9th | 8.8 | This vulnerability in ingress-nginx allows attackers to inject arbitrary nginx configuration via the | |
| 41 | CVE-2025-1323 |
|
97.9th | 7.5 | This SQL injection vulnerability in the WP-Recall WordPress plugin allows unauthenticated attackers | |
| 42 | CVE-2025-58034 |
|
97.9th | 7.2 | KEV | This OS command injection vulnerability in Fortinet FortiWeb web application firewalls allows authen |
| 43 | CVE-2024-12471 |
|
97.9th | 8.8 | This vulnerability allows authenticated WordPress users with subscriber-level access or higher to up | |
| 44 | CVE-2024-48457 |
|
97.9th | 7.5 | This vulnerability in multiple Netis router models allows remote attackers to access sensitive infor | |
| 45 | CVE-2025-21385 |
|
97.8th | 8.8 | This Server-Side Request Forgery (SSRF) vulnerability in Microsoft Purview allows authenticated atta | |
| 46 | CVE-2022-35737 |
|
97.8th | 7.5 | This SQLite vulnerability allows array-bounds overflow when processing extremely large string argume | |
| 47 | CVE-2025-34079 |
|
97.8th | 7.8 | This vulnerability allows authenticated attackers with administrator credentials to execute arbitrar | |
| 48 | CVE-2025-57790 |
|
97.8th | 8.8 | This CVE describes a path traversal vulnerability that allows remote attackers to access files outsi | |
| 49 | CVE-2013-10059 |
|
97.8th | 7.2 | This CVE describes an authenticated OS command injection vulnerability in D-Link DIR-615H1 routers r | |
| 50 | CVE-2025-34086 |
|
97.8th | 8.8 | This vulnerability allows authenticated users in Bolt CMS 3.7.0 and earlier to achieve remote code e |
What is EPSS?
The Exploit Prediction Scoring System (EPSS) is a data-driven model developed by FIRST.org that estimates the probability a CVE will be exploited in the wild within the next 30 days. Unlike CVSS which measures severity, EPSS measures likelihood of exploitation — making it ideal for prioritizing which vulnerabilities to patch first.
Why EPSS matters: With thousands of CVEs published monthly, not all vulnerabilities are equally dangerous. EPSS helps security teams focus on the CVEs most likely to be actively exploited, rather than patching solely by CVSS score. A critical CVSS 9.8 vulnerability with 0.1% EPSS may be less urgent than a high CVSS 7.5 with 90% EPSS.
Prioritize by Exploit Risk
Scan your servers and see which vulnerabilities have the highest EPSS scores. Focus on what attackers are actually targeting.
Start Monitoring Free