Skip to main content
HomeTopicsVulnerabilities

Vulnerabilities

We've curated 267 cybersecurity statistics about Vulnerabilities to help you understand how software weaknesses and system flaws are being exploited by cybercriminals in 2025. This insight can guide you in fortifying your defenses effectively.

Showing 1-20 of 267 results

The most widely detected vulnerability is CVE-2013-2566, which dates to 2013.

Barracuda2/22/2026
CVE-2013-2566

11% of detected vulnerabilities have a known exploit.

Barracuda2/22/2026
Known ExploitExploit Risk

58% of large AppSec teams (50 members or more) that use SCA cite the inability to verify if vulnerabilities are exploitable in production as a major pain point.

Rein Security2/22/2026
Application SecuritySCA

98% of API vulnerabilities are easy or trivial to exploit.

Wallarm2/22/2026
API SecurityExploitability

59% of API vulnerabilities require no authentication.

Wallarm2/22/2026
API SecurityAuthentication

MCP vulnerabilities grew 270% from Q2 to Q3 in 2025.

Wallarm2/22/2026
AI SecurityModel Context Protocol

97% of API vulnerabilities can be exploited with a single request.

Wallarm2/22/2026
API SecurityExploitability

25% of ICS-CERT and NVD vulnerabilities have incorrect CVSS scores.

Dragos2/22/2026
Vulnerability ScoringICS-CERT

In 2025, 14% of published AI vulnerabilities were MCP-related (315 MCP-related vulnerabilities).

Wallarm2/22/2026
AI VulnerabilitiesModel Context Protocol

38% of small AppSec teams (1–10 members) that use SCA cite the inability to verify if vulnerabilities are exploitable in production as their biggest pain point.

Rein Security2/22/2026
Application SecuritySCA

63% of mid-sized AppSec teams (11–50 members) that use SCA cite the inability to verify if vulnerabilities are exploitable in production as their biggest pain point.

Rein Security2/22/2026
Application SecuritySCA

26% percent of advisories in 2025 contained no patch or mitigation from vendors.

Dragos2/22/2026
Patch ManagementICS

In 2025, 17% of 67,058 published vulnerabilities (11,053 vulnerabilities) were API-related.

Wallarm2/22/2026
API SecurityAPI Vulnerabilities

99% of API vulnerabilities are remotely exploitable.

Wallarm2/22/2026
API SecurityRemote Exploitation

In 2025, 37 N-day vulnerabilities and 52 zero-day vulnerabilities specifically targeted security and perimeter software.

Flashpoint2/14/2026
N-Day VulnerabilitiesZero-Day Vulnerabilities

N-day vulnerabilities represent over 80% of all Known Exploited Vulnerabilities (KEVs) tracked over the past four years.

Flashpoint2/14/2026
Exploit TrendsN-Day Vulnerabilities

Of the 65 CVEs discussed by the BlackBasta ransomware group, 54 are Known Exploited Vulnerabilities (KEVs).

Flashpoint2/14/2026
RansomwareBlackBasta

71% of exploited vulnerabilities are not in the CISA KEV catalog.

Forescout Technologies Inc2/5/2026
KEV

242 vulnerabilities are added to the CISA Known Exploited Vulnerabilities catalog, a 30% year-over-year increase, and 285 vulnerabilities are added to the Vedere Labs KEV, a 213% year-over-year increase.

Forescout Technologies Inc2/5/2026
KEV

AI-generated code results in 15–18% more security vulnerabilities per line of code compared to human-written code.

Opsera2/4/2026
Software Security