Skip to main content
Back to Home

The top five categories for KEVs in 1H-2025 are: Content Management Systems (CMS): 86 KEVs, with a significant volume attributed to WordPress Plug-ins; Network Edge Devices: 77 KEVs; Server Software: 61 KEVs; Open Source Software: 55 KEVs; and Operating Systems: 38 KEVs.

July 30, 2025

The top five categories for KEVs in 1H-2025 are: Content Management Systems (CMS): 86 KEVs, with a significant volume attributed to WordPress Plug-ins; Network Edge Devices: 77 KEVs; Server Software: 61 KEVs; Open Source Software: 55 KEVs; and Operating Systems: 38 KEVs. — This cybersecurity statistic was published by VulnCheck in July 2025. It covers topics including Vulnerabilities, KEVs. The original data appears in State of Exploitation - A look Into The 1H-2025 Vulnerability Exploitation & Threat Activity. For the full methodology and detailed findings, refer to the original report.

Source

View Original Report

Published on 7/30/2025

Share or Copy this stat

Frequently Asked Questions

What does this statistic say?

The top five categories for KEVs in 1H-2025 are: Content Management Systems (CMS): 86 KEVs, with a significant volume attributed to WordPress Plug-ins; Network Edge Devices: 77 KEVs; Server Software: 61 KEVs; Open Source Software: 55 KEVs; and Operating Systems: 38 KEVs. This data was published by VulnCheck and covers Vulnerabilities, KEVs.

Where does this data come from?

This statistic comes from State of Exploitation - A look Into The 1H-2025 Vulnerability Exploitation & Threat Activity, published by VulnCheck on July 30, 2025. You can view the original report at https://www.vulncheck.com/blog/state-of-exploitation-1h-2025.

What cybersecurity topics does this cover?

This statistic relates to Vulnerabilities, KEVs. Browse more statistics on Vulnerabilities or from VulnCheck.

Want More Statistics Like This?

Get the latest cybersecurity stats delivered to your inbox every week

Stay Ahead of Cyber Threats

Join 1,000+ security professionals getting weekly insights