Vulnerabilities
We've curated 267 cybersecurity statistics about Vulnerabilities to help you understand how software weaknesses and system flaws are being exploited by cybercriminals in 2025. This insight can guide you in fortifying your defenses effectively.
Explore Subcategories
Related Topics
Showing 1-20 of 267 results
The most widely detected vulnerability is CVE-2013-2566, which dates to 2013.
11% of detected vulnerabilities have a known exploit.
58% of large AppSec teams (50 members or more) that use SCA cite the inability to verify if vulnerabilities are exploitable in production as a major pain point.
98% of API vulnerabilities are easy or trivial to exploit.
59% of API vulnerabilities require no authentication.
MCP vulnerabilities grew 270% from Q2 to Q3 in 2025.
97% of API vulnerabilities can be exploited with a single request.
25% of ICS-CERT and NVD vulnerabilities have incorrect CVSS scores.
In 2025, 14% of published AI vulnerabilities were MCP-related (315 MCP-related vulnerabilities).
38% of small AppSec teams (1–10 members) that use SCA cite the inability to verify if vulnerabilities are exploitable in production as their biggest pain point.
63% of mid-sized AppSec teams (11–50 members) that use SCA cite the inability to verify if vulnerabilities are exploitable in production as their biggest pain point.
26% percent of advisories in 2025 contained no patch or mitigation from vendors.
In 2025, 17% of 67,058 published vulnerabilities (11,053 vulnerabilities) were API-related.
99% of API vulnerabilities are remotely exploitable.
In 2025, 37 N-day vulnerabilities and 52 zero-day vulnerabilities specifically targeted security and perimeter software.
N-day vulnerabilities represent over 80% of all Known Exploited Vulnerabilities (KEVs) tracked over the past four years.
Of the 65 CVEs discussed by the BlackBasta ransomware group, 54 are Known Exploited Vulnerabilities (KEVs).
71% of exploited vulnerabilities are not in the CISA KEV catalog.
242 vulnerabilities are added to the CISA Known Exploited Vulnerabilities catalog, a 30% year-over-year increase, and 285 vulnerabilities are added to the Vedere Labs KEV, a 213% year-over-year increase.
AI-generated code results in 15–18% more security vulnerabilities per line of code compared to human-written code.