The top five categories for KEVs in 1H-2025 are: Content Management Systems (CMS): 86 KEVs, with a significant volume attributed to WordPress Plug-ins; Network Edge Devices: 77 KEVs; Server Software: 61 KEVs; Open Source Software: 55 KEVs; and Operating Systems: 38 KEVs.
The top five categories for KEVs in 1H-2025 are: Content Management Systems (CMS): 86 KEVs, with a significant volume attributed to WordPress Plug-ins; Network Edge Devices: 77 KEVs; Server Software: 61 KEVs; Open Source Software: 55 KEVs; and Operating Systems: 38 KEVs. — This cybersecurity statistic was published by VulnCheck in July 2025. It covers topics including Vulnerabilities, KEVs. The original data appears in State of Exploitation - A look Into The 1H-2025 Vulnerability Exploitation & Threat Activity. For the full methodology and detailed findings, refer to the original report.
Share or Copy this stat
Frequently Asked Questions
What does this statistic say?
The top five categories for KEVs in 1H-2025 are: Content Management Systems (CMS): 86 KEVs, with a significant volume attributed to WordPress Plug-ins; Network Edge Devices: 77 KEVs; Server Software: 61 KEVs; Open Source Software: 55 KEVs; and Operating Systems: 38 KEVs. This data was published by VulnCheck and covers Vulnerabilities, KEVs.
Where does this data come from?
This statistic comes from State of Exploitation - A look Into The 1H-2025 Vulnerability Exploitation & Threat Activity, published by VulnCheck on July 30, 2025. You can view the original report at https://www.vulncheck.com/blog/state-of-exploitation-1h-2025.
What cybersecurity topics does this cover?
This statistic relates to Vulnerabilities, KEVs. Browse more statistics on Vulnerabilities or from VulnCheck.