main logo icon

Published on

April 29, 2026

|

26 min read

Vulnerability Statistics 2026: CVE Volume, Time-to-Exploit, and CISA KEV

Verified 2025 CVE, KEV, and zero-day statistics from NVD, CISA, Verizon DBIR, Mandiant, Google GTIG, IBM, Microsoft, CrowdStrike, Sonatype, and more.

Arafat Afzalzada

Arafat Afzalzada

Founder

Web App Security

Summarize with AI

ChatGPTPerplexityGeminiGrokClaude

TL;DR

In 2025, the public CVE program published 48,185 new vulnerabilities, a 20.6 percent jump on top of the record 38 percent surge in 2024 (40,009 CVEs). The CISA Known Exploited Vulnerabilities catalog grew 20 percent to 1,484 entries, with 245 added in the year and 24 explicitly tagged as ransomware-exploited. Google's Threat Intelligence Group counted 90 zero-days exploited in the wild, with enterprise technology hitting an all-time high share at 48 percent. Mandiant's M-Trends 2026 finds the mean time to exploit a given vulnerability is now an estimated negative seven days, meaning exploitation is routinely occurring before a patch is even released, and the initial-access-broker handoff to a ransomware affiliate has collapsed to 22 seconds. The Verizon 2025 DBIR confirms vulnerability exploitation now drives 20 percent of breaches, up 34 percent year-over-year, with edge-device and VPN exploitation rising roughly 8x to 22 percent of initial-access cases. NIST formally transitioned the National Vulnerability Database to a triage model on April 15, 2026, reclassifying about 29,000 backlog CVEs as Not Scheduled and committing to enrich only an estimated 15 to 20 percent of incoming CVEs going forward. This post compiles 100-plus verified numbers from NVD, CISA, CVE.org, Mandiant, Google GTIG, Verizon, IBM, Microsoft, CrowdStrike, Sonatype, Synopsys, Veracode, Trend Micro ZDI, FIRST EPSS, VulnCheck, and HackerOne, and is designed for CISOs, vulnerability-management leads, and journalists writing the 2026 reference.

The public CVE program published 48,185 new vulnerabilities in 2025, a 20.6 percent year-over-year increase on top of the record 38 percent jump in 2024 (40,009 CVEs). Over the same window, the CISA Known Exploited Vulnerabilities catalog grew roughly 20 percent to 1,484 entries, Google's Threat Intelligence Group counted 90 zero-days exploited in the wild (with enterprise tech hitting an all-time high share at 48 percent), and Mandiant's M-Trends 2026 put the mean time to exploit at an estimated negative seven days, meaning exploitation routinely happens before a patch is even released. None of those numbers are theoretical: every figure links back to a named primary publisher and most are now corroborated across at least two independent reports.

Three forces are reshaping vulnerability management in 2026. First, the CVE pipeline has industrialized. The total number of CVE Numbering Authorities reached 484 by January 2026, with the Linux Kernel CNA alone publishing 4,325 records in 2024 (10.81 percent of the year's total) and GitHub adding another 2,121. The 2024 surge was not a one-time blip. CVE submissions grew +263 percent between 2020 and 2025, and Q1 2026 submissions are tracking ~33 percent higher than Q1 2025. Second, the National Vulnerability Database has stopped trying to enrich every CVE. NIST formally transitioned NVD to a triage model on April 15, 2026, reclassifying approximately 29,000 backlog CVEs as Not Scheduled and committing to enrich only the 15 to 20 percent of incoming CVEs that intersect KEV, federal-government software, or Executive Order 14028 critical-software lists. Third, time-to-exploit has compressed past the patch cycle. Mandiant, CrowdStrike, and Google all report exploitation routinely beating disclosure: Mandiant's mean time to exploit dropped to negative seven days in 2025, CrowdStrike found 42 percent of exploited vulnerabilities were attacked before public disclosure, and Verizon's 2025 DBIR clocked vulnerability exploitation as 20 percent of breaches, a 34 percent rise driven heavily by edge-device and VPN bugs.

This post is the Stingrai research team's canonical 2026 reference for CVE and exploitation activity. It assembles 100-plus numeric claims from named primary publishers including NVD / NIST, CISA KEV, CVE.org, Mandiant M-Trends 2025 and 2026, Google GTIG / Project Zero, the Verizon 2025 DBIR, IBM X-Force 2025 and 2026, the Microsoft Digital Defense Report 2025 plus Patch Tuesday tallies, CrowdStrike 2026 Global Threat Report, Sonatype State of the Software Supply Chain 2026, the Synopsys Open Source Security and Risk Analysis Report, Veracode State of Software Security 2025, Trend Micro Zero Day Initiative, FIRST EPSS, VulnCheck, GreyNoise, and HackerOne. Lead data is full-year 2025 telemetry, the freshest available; primary publishers have not yet released full-year 2026 reports as of April 29, 2026. Every figure links back to its primary publisher so any claim can be audited.

TL;DR: 12 labeled key stats

Key takeaways

  • The CVE pipeline is no longer a useful queue, it is a firehose. 48,185 records published in 2025, 484 CNAs, and the Linux Kernel CNA alone matching the entire annual volume of the early 2010s. Vulnerability programs that triage by NVD CVSS will miss roughly a third of the year's exploited-in-the-wild bugs because NVD is no longer scoring most of them. Triage now starts with CISA KEV plus EPSS, not NVD.

  • The KEV catalog is the operational signal that matters. 1,484 entries, ~24 percent are Microsoft, and 19 of the 59 ransomware-flagged 2025 KEV adds target network-security appliances (Ivanti, Fortinet, Citrix, Palo Alto, Zimbra) — exactly the boxes deployed to protect the perimeter. If you patch nothing else, patch your edge.

  • Time-to-exploit has crossed zero. Mandiant's mean time to exploit is estimated at -7 days for 2025, meaning exploitation routinely beats the patch. CrowdStrike measures 42 percent of exploited bugs hit before disclosure, eCrime breakout time of 29 minutes (fastest 27 seconds), and data exfiltration starting within 4 minutes of initial access. The patch cycle is no longer a defensive primitive on its own.

  • Enterprise tech is now the primary zero-day target. Google GTIG's 2025 review records 90 zero-days exploited in the wild, with 43 (48%) targeting enterprise technologies — the highest enterprise share ever recorded. Microsoft (25), Google (11), Apple (8), and Cisco (4) led vendor counts.

  • NIST has formally given up on enriching the long tail. As of April 15, 2026 NVD operates as a triage queue, with ~29,000 legacy CVEs marked Not Scheduled and only an estimated 15 to 20 percent of new CVEs receiving full enrichment. Vulnerability programs that depend on NVD CPE matching alone are blind to ~80 percent of the population. VulnCheck's analysis of 2024 CVE data found NVD CPE coverage was already only 41 percent.

Methodology

Date cutoff: April 29, 2026. Lead data is full-year 2025 telemetry where a primary publisher has released it; figures labeled "2026" are first-quarter or projection numbers from named publishers. Statistics that could not be reached via a named primary source on at least one verification pass were dropped rather than estimated. Where multiple primary publishers report compatible figures we cite the publisher whose methodology window matches the claim. Secondary sources are used only where they constitute a public record of a CVE event (corporate disclosure, KEV addition, ZDI advisory).

Sources span: NIST National Vulnerability Database; CVE.org / MITRE; CISA Known Exploited Vulnerabilities Catalog; Mandiant M-Trends 2025 and 2026 (450,000 hours of incident response data); Google Threat Intelligence Group / Project Zero 2024 and 2025 zero-day reviews; Verizon 2025 DBIR (22,052 incidents); IBM X-Force 2025 and 2026; the Microsoft Digital Defense Report 2025 and Microsoft Patch Tuesday tallies; CrowdStrike 2026 Global Threat Report; Sonatype State of the Software Supply Chain 2026; Synopsys Open Source Security and Risk Analysis Report; Veracode State of Software Security 2025; Trend Micro Zero Day Initiative (Pwn2Own); FIRST EPSS v4 release; VulnCheck NVD++; GreyNoise mass-exploitation telemetry; HackerOne 9th Annual Hacker-Powered Security Report; and named CVE advisories from Citrix, Ivanti, Cleo, F5, Broadcom / VMware, and Microsoft Security Response Center.

Chart Vuln Cves By Year

Figure 1: CVE publication volume per year, 2014 to 2025. The 2024 inflection (40,009 CVEs, +38% YoY) reflects the Linux Kernel becoming a CNA in February 2024 and the broader expansion of CNA participation. Sources: JerryGamblin.com 2024 review; JerryGamblin.com 2025 review; NVD historical statistics.

How big is the CVE pipeline in 2026?

Three datasets anchor the answer.

Annual CVE publication volume

JerryGamblin's 2025 CVE Data Review, the longest-running independent count of CVE publication, recorded 48,185 CVEs published in 2025, a 20.6 percent increase on 2024's 39,962 (the upstream JerryGamblin number; CVE.org figures cited at 40,009 elsewhere reconcile within the same window). The cumulative tally since 1999 reached 308,920 by year-end. December 2025 was the highest-volume month at 5,500 CVEs, more than 11 percent of the year's total in a single month. The trajectory: roughly 7,938 in 2014, ~16,500 in 2018, ~20,000 in 2021, 28,818 in 2023, 40,009 in 2024, 48,185 in 2025.

CNA participation

The number of CVE Numbering Authorities crossed 484 organizations on January 1, 2026, per the public CNA-distribution tracker maintained by Scott Moore. Of those, 142 disclosed zero CVEs in 2025; the working core is roughly 340 CNAs that contribute records in any given year. The single biggest 2024 contributor was the Linux Kernel CNA, founded in mid-February 2024, which published 4,325 CVEs that year, 10.81 percent of the total. GitHub published 2,121. WordPress-plugin CNAs Patchstack and Wordfence rounded out the top five. Together with VulDB they accounted for 17,473 CVEs (43.67 percent of the 2024 total).

Submission growth and Q1 2026 outlook

NIST's April 2026 update records CVE submission growth of +263 percent between 2020 and 2025. Q1 2026 submissions are tracking roughly one-third higher than Q1 2025, putting the program on pace for another record year. None of this is a sign of a worsening security landscape on its own; it is largely a sign that more CNAs are reporting more bugs more thoroughly. But the volume has saturated downstream consumers, and that is what the NVD reform is trying to triage.

Chart Vuln Top Cnas

Figure 2: Top CVE Numbering Authorities by 2024 disclosure volume. The Linux Kernel CNA, founded mid-February 2024, immediately became the single largest CNA. Sources: YesWeHack analysis of 2024 CVE surge; JerryGamblin.com 2024 review; Scott Moore CNA Distribution Tracker.

The NVD analysis backlog and the April 2026 reset

Starting in early 2024, NVD developed a significant backlog of unenriched CVEs and was unable to clear it. Three forces collided: a 12 percent NIST budget cut, a CISA pause of its $3.7M annual NVD funding in late 2023, and the +263 percent submission surge described above. By late 2025 the backlog had grown to tens of thousands of records.

NIST's response, formalized on April 15, 2026, is a risk-based triage model:

  • Approximately 29,000 backlog CVEs with NVD publication dates earlier than March 1, 2026 are now classified Not Scheduled.

  • Going forward, NVD will prioritize CVEs that meet at least one of three criteria: (1) the CVE is in the CISA KEV catalog, (2) the affected software is used within the federal government, or (3) the affected software is "critical software" under Executive Order 14028.

  • This is estimated to be 15 to 20 percent of incoming CVE volume.

  • NIST enriched ~42,000 CVEs in 2025 already (a 45 percent productivity gain), but submissions still outpaced output.

VulnCheck's analysis of CVE-2025 records found that approximately 10,000 had no CVSS score and only about 32 percent had been fully enriched by April 2026. Their separate analysis of the 2024 corpus found that NVD provided CPE identifiers for only 41.35 percent of published vulnerabilities, while VulnCheck's NVD++ enrichment service covered 76.95 percent of the same population. The practical implication: CPE-keyed asset matching against NVD will miss the majority of CVEs, regardless of whether they are Critical, High, or actively exploited. Enterprise vulnerability programs need either commercial enrichment, vendor advisories, or a KEV-first triage discipline.

CVSS severity distribution: critical and high are stable, medium is bloating

Per the Vulnerability Blog 2024 review of NVD severity data, the 2024 CVSS distribution was approximately:

CVSS severity

2024 share

Critical (9.0-10.0)

14%

High (7.0-8.9)

34%

Medium (4.0-6.9)

50%

Low (0.1-3.9)

2%

Volume of Critical CVEs has remained relatively consistent across 2022 through 2025; the share is dropping as Medium-severity volumes balloon. The 2024 average CVSS score was 7.1, a drop from 7.7 in 2023. This matters because (a) Critical-only triage misses material exploited bugs (multiple 2025 KEV adds were CVSS 7.x or 8.x), and (b) Medium-severity-and-below volume is precisely where the NVD analysis backlog now lives.

Chart Vuln Severity Mix

Figure 3: Left: CVSS v3 severity distribution among NVD-reviewed 2024 CVEs. Right: zero-day enterprise vs consumer share, 2024 vs 2025. Sources: Vulnerability Blog 2024 in review; Google Cloud zero-day 2025 review.

CISA KEV: the operational signal of 2026

The CISA Known Exploited Vulnerabilities Catalog became, in 2025, the de facto first-tier triage list for vulnerability management programs. CISA only adds CVEs with reliable evidence of in-the-wild exploitation, which makes it a far higher-signal feed than CVSS-only NVD data.

Catalog scale and growth

Metric

Value

Source

KEV total entries, end-2024

1,239

SecurityWeek

KEV total entries, end-2025

1,484

SecurityWeek

KEV 2025 additions

245

SecurityWeek

KEV YoY growth 2024 to 2025

+20%

SecurityWeek

KEV 2025 ransomware-tagged additions

24

SecurityWeek

KEV growth in 2025 was roughly 30 percent above the 2023 to 2024 trend, per Cyble's analysis of the catalog updates.

Vendor distribution at end-2025

Cybersecurity News breakdown of the catalog by vendor:

Vendor

KEV entries

Share of catalog

Microsoft

350

~24%

Apple

86

5.8%

Cisco

82

5.5%

Adobe

76

5.1%

Google

67

4.5%

Microsoft Windows alone accounts for 159 product-specific KEV entries, Chromium V8 for 37, Internet Explorer for 34, and various Microsoft Office products for additional volume. Microsoft also leads ransomware-flagged KEV entries with 100, followed by Fortinet (13), Ivanti (12), and Oracle (11).

Most important pattern: edge devices

Of the 59 KEV entries that were updated in 2025 to reflect ransomware exploitation, 19 target network security appliances — VPNs, firewalls, gateway proxies, the Citrix and Ivanti and Fortinet and Palo Alto and Zimbra family of edge boxes that an enterprise typically buys to protect the perimeter. CL0P used CitrixBleed 2 (CVE-2025-5777) and Oracle E-Business Suite (CVE-2025-61882, CVE-2025-61884) to mass-exfiltrate; UNC5221 chained CVE-2025-0282 and then CVE-2025-22457 against Ivanti Connect Secure VPN appliances. Edge devices are the single hottest segment of the 2025 KEV catalog.

Chart Vuln Kev Additions

Figure 4: CISA Known Exploited Vulnerabilities catalog distribution by vendor at end of 2025. Microsoft accounts for ~24% of all entries. Sources: Cybersecurity News KEV vendor analysis; SecurityWeek KEV 2025 expansion; CISA KEV catalog.

Time-to-exploit: the patch cycle is no longer a defensive primitive

The most important shift in the 2025 to 2026 dataset is that exploitation routinely beats disclosure.

The M-Trends 2026 report, built on more than 450,000 hours of Mandiant incident response engagements, made three findings that should reshape every vulnerability-management runbook:

  1. The mean time to exploit is approximately negative seven days. Across the population of vulnerabilities Mandiant observed being weaponized in 2025, exploitation began on average a week before the vendor patch was publicly available. This is not a single zero-day outlier; it is the mean across the dataset.

  2. Exploits remain the leading initial-access vector for the sixth consecutive year. Many of the bugs used were exploited as zero-days, meaning attackers had working exploits before patches existed.

  3. The initial-access-broker handoff to a downstream ransomware affiliate now averages 22 seconds. This is the time between an IAB gaining persistent access to a victim network and a ransomware operator beginning encryption operations against that same network.

Median dwell time rose to 14 days in 2025, up from 11 days in 2024 and 10 days in 2023. The increase is concentrated in two long-tail categories: long-term espionage intrusions and North Korean IT-worker operations, both of which had a median dwell time of 122 days (about four months). For the rest of the population, dwell time has actually compressed.

CrowdStrike 2026 Global Threat Report

CrowdStrike's 2026 Global Threat Report corroborates Mandiant on the speed metric:

  • 42 percent of exploited vulnerabilities were attacked before public disclosure.

  • eCrime breakout time averaged 29 minutes, a 65 percent speed increase over 2024.

  • The fastest observed breakout was 27 seconds.

  • In one intrusion, data exfiltration began within 4 minutes of initial access.

  • AI-enabled adversary attacks rose 89 percent year-over-year, weaponizing AI across reconnaissance, credential theft, and evasion.

Google GTIG 2025 zero-day review

The Google Threat Intelligence Group's 2025 zero-day review tracked 90 zero-day vulnerabilities exploited in the wild in 2025. Multi-year context:

Year

Zero-days exploited in the wild

2021

84

2022

63

2023

100 (record)

2024

78

2025

90

The 2025 number is below the 2023 record but above 2024. The composition shift is what matters: enterprise technology accounted for 43 of the 90 zero-days (48 percent), an all-time high share. Microsoft led vendors with 25 zero-days, followed by Google (11), Apple (8), and Cisco (4). Operating systems — both mobile and desktop — were the single most-targeted category, climbing from 40 percent of all zero-days in 2024 to 44 percent in 2025.

Chart Vuln Time To Exploit

Figure 5: Time-to-exploit and breakout metrics across primary 2026 reports. Sources: Mandiant M-Trends 2026; CrowdStrike 2026 Global Threat Report; Google GTIG 2025 zero-day review.

Verizon 2025 DBIR: vulnerability exploitation hits 20% of breaches

The 2025 Verizon DBIR, published April 23, 2025 and based on 22,052 security incidents and 12,195 confirmed breaches, quantified two structural shifts:

  1. Vulnerability exploitation is now 20 percent of breaches, up 34 percent year-over-year. It is two percentage points behind credential abuse (22 percent), the top initial-access vector. Vulnerability exploitation has roughly tripled in two years as a share of breaches.

  2. Edge devices and VPNs went from 3 percent of breaches to 22 percent, a roughly 8x rise as an initial-access category in a single year. This is the same pattern visible in the KEV catalog.

The DBIR also confirmed that the human element drives 60 percent of breaches, stolen credentials drive 22 percent, and phishing 15 percent. AI did not invent new attack categories in 2025, but it accelerated existing ones — and exploited vulnerabilities accelerated alongside.

IBM X-Force: critical infrastructure under siege

The IBM X-Force Threat Intelligence Index 2025 found:

  • Exploitation of public-facing applications tied with valid-credential use as the top initial-access vector, both at 30 percent of incident-response engagements in 2024.

  • Critical-infrastructure organizations accounted for 70 percent of all attacks IBM X-Force responded to in 2024.

  • Over 25 percent of those critical-infrastructure attacks were caused by vulnerability exploitation.

  • Four of the top ten CVEs most-mentioned on dark web forums were linked to sophisticated nation-state-aligned threat actor groups, with exploit code openly traded.

The follow-on IBM X-Force 2026 reports a +44 percent surge in exploitation of public-facing applications over the prior year window, with supply chain and identity attacks intensifying alongside.

Microsoft Patch Tuesday: 1,130 CVEs in 2025

Microsoft's 2025 Patch Tuesday total reached 1,130 CVEs, a 12 percent increase over 2024's 1,009. This is the second consecutive year above 1,000 and the second-largest year on record, just 111 CVEs shy of 2020's all-time record of 1,245. The Microsoft Digital Defense Report 2025 places vulnerability exploitation at 17 percent of initial-access methods observed by Microsoft Incident Response, with 18 percent of breaches initiated through unpatched web assets and 12 percent through exposed remote services.

Both Microsoft datasets reinforce the same point as Mandiant and CrowdStrike: vulnerability volume is high, exploitation is fast, and edge and remote-service exposure is the single biggest patch-prioritization category.

Notable named exploitations in 2025

Six named CVEs defined the operational year. Each is verified at NVD with a corresponding KEV addition.

CitrixBleed 2 (CVE-2025-5777)

CVE-2025-5777, CVSS 9.3, is an out-of-bounds memory-read vulnerability in Citrix NetScaler ADC and Gateway. Affected configurations include Gateway and AAA virtual servers, the deployments most commonly used for enterprise remote access. Exploitation leaks session tokens (including for the nsroot administrative user), enabling session hijacking and MFA bypass without authentication. Per GreyNoise telemetry, targeted exploitation began as early as June 23, 2025, almost two weeks before the public proof-of-concept on July 4. Within weeks of public disclosure, GreyNoise observed over 11.5 million attack attempts globally. CISA added the CVE to KEV on July 10, 2025. CL0P later used CitrixBleed 2 in extortion campaigns.

Cleo Harmony / VLTrader / LexiCom (CVE-2024-50623)

CVE-2024-50623, CVSS 8.8, is an unrestricted file-upload vulnerability in Cleo's managed file transfer products. Disclosed October 28, 2024 and actively exploited from late November 2024 onward, the bug enabled CL0P to gain RCE on Cleo MFT hosts and exfiltrate data from at least 50 organizations, with CL0P's leak site claiming up to 66 victims. The most prominently named victim is Blue Yonder, the supply-chain-management vendor that powers logistics for many Fortune 500 retailers and food companies. CISA added the CVE to KEV on December 13, 2024. Cleo's initial patch was bypassed; a follow-on CVE-2024-55956 covered the remaining vector.

Ivanti Connect Secure (CVE-2025-0282 and CVE-2025-22457)

CVE-2025-0282, CVSS 9.0, is an unauthenticated stack-based buffer overflow in Ivanti Connect Secure VPN appliances. Mandiant attributed exploitation starting mid-December 2024 to UNC5221, a suspected China-nexus espionage actor previously associated with the 2023-2024 Ivanti VPN exploitation chain (CVE-2023-46805, CVE-2024-21887). UNC5221 deployed the ZIPLINE passive backdoor, THINSPOOL dropper, LIGHTWIRE web shell, and WARPWIRE credential harvester.

CVE-2025-22457, CVSS 9.8, is a stack-based buffer overflow disclosed in early 2025 and actively exploited by UNC5221 in mid-March 2025. Approximately 5,000 internet-facing Ivanti Connect Secure appliances were exposed at disclosure. UNC5221 used CVE-2025-22457 to deploy two new custom families: TRAILBLAZE (in-memory dropper using raw syscalls) and BRUSHFIRE (passive SSL/TLS-intercepting backdoor).

F5 BIG-IP (CVE-2025-53521)

CVE-2025-53521, CVSS v4.0 9.3, is a critical pre-authentication remote code execution vulnerability in F5 BIG-IP Access Policy Manager (APM). Initially disclosed October 15, 2025 as a denial-of-service flaw, F5 reclassified it as RCE on March 27, 2026. CISA added it to KEV the same day, with a 72-hour federal patching directive. The reclassification followed defused-cyber and other reports of acute scanning activity.

VMware vCenter (CVE-2024-38812 and CVE-2024-37079)

CVE-2024-38812, CVSS 9.8, is a heap-overflow in VMware vCenter Server's DCERPC implementation. Broadcom confirmed in-the-wild exploitation by November 2024, and the patch released September 17, 2024 was found incomplete and re-patched. CVE-2024-37079, also covering vCenter Server, was added to KEV in early 2026 after additional confirmed exploitation.

EPSS: probabilistic exploit prediction enters the workflow

The FIRST Exploit Prediction Scoring System (EPSS), now in v4 (released March 17, 2025), is a data-driven machine-learning model that estimates the probability a published CVE will be exploited in the wild within the next 30 days, expressed on the [0,1] scale plus a percentile. EPSS v4 hits an ROC AUC of 0.838, meaning it correctly distinguishes exploited from non-exploited CVEs about 84 percent of the time. The top 10 percent of EPSS-scored CVEs account for a disproportionate share of observed exploitation.

In 2026 the practical EPSS workflow looks like: triage by KEV first (binary, gold-standard exploited-in-the-wild signal); then by EPSS percentile (probabilistic; the top 1 to 5 percent should be patched at zero-day urgency even if not in KEV); then by CVSS only as a tiebreaker. Many vendors now expose an EPSS column directly in their vulnerability-management dashboards.

Open-source supply chain CVEs and malicious-package volume

Sonatype's 2026 State of the Software Supply Chain report recorded:

  • 454,648 new malicious packages identified by Sonatype in 2025.

  • Cumulative blocked-malware total: 1.233M packages across npm, PyPI, Maven Central, NuGet, and Hugging Face.

  • 99 percent or more of 2025 OSS malware originated on npm.

  • The Shai-Hulud worm compromised 500+ npm packages in days, spreading autonomously.

  • The IndonesianFoods campaign generated 100,000+ malicious packages, doubling total npm malware volume in days by creating one new package every seven seconds.

  • 800+ Lazarus Group-associated packages were identified by Sonatype in 2025, 97 percent on npm.

The Synopsys / Black Duck Open Source Security and Risk Analysis Report (OSSRA), based on more than 1,000 commercial codebase audits across 17 industries, found:

  • 74 percent of codebases contained at least one high-risk OSS vulnerability (a 54 percent jump over the prior year).

  • 84 percent of codebases contained at least one OSS vulnerability of any severity.

  • Mean age of OSS vulnerabilities in codebases: more than 2.5 years.

  • Nearly a quarter of codebases contained vulnerabilities more than 10 years old.

The Veracode 2025 State of Software Security report, based on 1.3 million unique applications and 126.4 million raw findings, found:

  • Average time to fix a flaw is now 252 days, up 47 percent since 2020.

  • 50 percent of organizations carry critical security debt — high-exploitability vulnerabilities open for more than a year.

  • 70 percent of that critical security debt comes from third-party code (open source plus commercial dependencies).

  • Leading organizations fix half their flaws in 5 weeks or less; lagging organizations take more than a year.

The cross-cutting takeaway: open-source dependency risk remains the largest single contributor to enterprise application-layer vulnerability exposure, and it is now intersecting directly with malicious-package campaigns at the registry level.

Pwn2Own and ZDI: organized researcher disclosure

Trend Micro's Zero Day Initiative is one of the largest researcher-disclosure programs and the operator of Pwn2Own. Two recent events anchor the 2025 to 2026 record:

  • Pwn2Own Vancouver 2025: ZDI awarded more than $315,000 total over the two-day contest, purchasing 18 different bugs across the targeted product set.

  • Pwn2Own Automotive 2026: a much larger event. 76 unique zero-day vulnerabilities were disclosed; researchers earned $1,047,000 in prizes.

ZDI's broader function in 2026 is brokered disclosure: research teams sell working zero-days into ZDI, ZDI confirms and reports privately to the vendor, and the resulting CVE is published once a patch ships. This is one of the few mechanisms that closes the gap between researcher discovery and vendor patching at scale.

HackerOne: bug-bounty disclosure volume

HackerOne's 9th Annual Hacker-Powered Security Report draws on:

  • 580,000+ validated vulnerabilities reported to date across the platform.

  • 1,950 enterprise programs active in 2025.

  • $81M paid out in bounties in 2025.

HackerOne's 2025 disclosure data also shows the AI inflection: AI vulnerability reports surged more than 200 percent year-over-year, with prompt injection up 540 percent, confirming AI as the fastest-growing attack surface for bug-bounty researchers.

What this means for 2026 vulnerability management

Six tactical implications fall out of the data above. None are speculative; each maps to a specific stat already cited.

1. KEV-first patch triage

CISA KEV is the highest-signal feed for prioritization. With 1,484 entries, ~24 percent Microsoft, and 19 of 59 ransomware-tagged 2025 KEV adds targeting network-security appliances, KEV directly tells you which bugs adversaries are using right now. SLA every KEV entry on a 7-to-14-day patch cycle (federal agencies are bound by BOD 22-01 to remediate KEV CVEs on tighter timelines).

2. Edge-device + VPN are the single hottest patching tier

Verizon's 8x rise in edge-device-and-VPN initial access (3 percent → 22 percent), CL0P + UNC5221 + UNC5807 targeting Citrix, Cleo, Ivanti, Fortinet, F5, and VMware, and Mandiant's observation that threat clusters are deliberately targeting boxes that lack EDR telemetry — the picture is unambiguous. If you patch nothing else, patch the edge.

3. EPSS top-1-percent at zero-day urgency

The FIRST EPSS top decile concentrates a disproportionate share of real-world exploitation. Use the top 1 percent (or top 100 CVEs) as a virtual KEV-precursor. EPSS v4 ROC AUC 0.838 means the model is good enough to drive operational decisions, not a research curiosity.

4. NVD CPE matching is no longer sufficient

Per VulnCheck, NVD covered only 41 percent of 2024 CVEs with CPEs. Post-April-2026 the population covered by full NVD enrichment will drop to an estimated 15 to 20 percent. Programs that key off CPE-NVD must add a second-source enrichment feed (vendor advisories, VulnCheck NVD++, GitHub Security Advisories, OSV.dev, EPSS) or accept they will miss the majority of CVEs.

5. SLA the OSS supply-chain vector independently

Sonatype's 454,648 new malicious packages in 2025, the Shai-Hulud worm, the IndonesianFoods campaign, and the 800+ Lazarus packages are not "CVE work." They live in dependency manifests and registry metadata. Pair SCA / SBOM tooling with registry-side monitoring, and SLA dependency-related advisories on the same clock as KEV.

6. Detection over patch, on the boxes that cannot be patched fast

Mandiant's mean time to exploit is -7 days, CrowdStrike's fastest breakout is 27 seconds, exfiltration starts within 4 minutes. The patch cycle is structurally too slow to cover edge devices that take maintenance windows or attacker-friendly products that lack EDR telemetry. The mitigation is detection layered with patch: EDR/XDR coverage on every appliance that supports it, network-flow telemetry on appliances that don't (per Mandiant's UNC6201 / UNC5807 callout on edge-device targeting), and pre-staged isolation playbooks for likely zero-day-prone categories.

Internal references

The Stingrai research team has published companion 2026 reference posts that intersect this dataset:

For penetration-testing engagements that map directly to the exposure profile in this post — VPN, gateway, edge appliance, web application, and managed-file-transfer testing — see Stingrai PTaaS and Penetration Testing Methodologies.

Frequently asked questions

How many CVEs were published in 2025?

48,185. The total number of CVEs published in 2025 set a new single-year record, a 20.6 percent increase on 2024's 39,962. Cumulative CVEs since 1999 reached 308,920 by year-end, per JerryGamblin's 2025 CVE Data Review.

How many vulnerabilities are in the CISA KEV catalog?

1,484 entries at the end of 2025, with 245 added during 2025 (a 20 percent year-over-year expansion). Microsoft accounts for ~24 percent of all entries (350 vulnerabilities), followed by Apple (86), Cisco (82), Adobe (76), and Google (67), per the SecurityWeek summary and Cybersecurity News breakdown.

What is the average time to exploit a vulnerability in 2026?

The mean time to exploit was estimated at negative seven days in 2025, meaning exploitation is routinely occurring before a patch is even released. CrowdStrike's 2026 Global Threat Report finds 42 percent of exploited vulnerabilities were attacked before public disclosure, and the initial-access-broker handoff to a ransomware affiliate now averages 22 seconds, per Mandiant M-Trends 2026.

How many zero-day vulnerabilities were exploited in the wild in 2025?

90 zero-days, per Google's Threat Intelligence Group. 2025 was higher than 2024 (78) but below the 2023 record of 100. Enterprise technology hit an all-time-high share at 48 percent (43 of 90). Microsoft (25), Google (11), Apple (8), and Cisco (4) led vendor counts.

What share of breaches involved vulnerability exploitation in 2025?

The Verizon 2025 DBIR found vulnerability exploitation as the initial-access vector in 20 percent of breaches, a +34 percent year-over-year increase and roughly 3x the share two years earlier. Edge-device and VPN exploitation grew nearly 8x in a single year, from 3 percent to 22 percent of initial-access cases.

What changed at the National Vulnerability Database in 2026?

NIST transitioned NVD to a triage model on April 15, 2026 in response to a +263 percent surge in CVE submissions between 2020 and 2025. Approximately 29,000 backlog CVEs were reclassified as Not Scheduled, and going forward only an estimated 15 to 20 percent of incoming CVEs will receive full NVD enrichment, prioritized by KEV membership, federal-government use, and Executive Order 14028 critical-software status.

What is EPSS and should we use it?

The Exploit Prediction Scoring System is a FIRST-maintained machine-learning model that scores each CVE's probability of being exploited in the wild within 30 days. EPSS v4, released March 17, 2025, achieves an ROC AUC of 0.838. The top 10 percent of EPSS-scored CVEs concentrate a disproportionate share of observed exploitation. EPSS now belongs in the second tier of vulnerability-management triage, after CISA KEV and before raw CVSS.

Are open-source dependencies the biggest source of vulnerability risk?

For application-layer code, yes. Synopsys OSSRA found 74 percent of audited codebases contained a high-risk OSS vulnerability and the mean age of OSS vulns in production codebases is more than 2.5 years. Veracode 2025 found 70 percent of critical security debt comes from third-party code. Independently, Sonatype blocked 454,648 new malicious packages in 2025, with 99 percent or more on npm.

What were the most-exploited named CVEs in 2025?

CitrixBleed 2 (CVE-2025-5777, Citrix NetScaler), Cleo MFT (CVE-2024-50623 and CVE-2024-55956), Ivanti Connect Secure (CVE-2025-0282, CVE-2025-22457), VMware vCenter (CVE-2024-38812, CVE-2024-37079), and F5 BIG-IP APM (CVE-2025-53521). All received CISA KEV additions and confirmed in-the-wild exploitation by 2025 to early 2026.

How fast does a patch need to ship to be useful?

Faster than the patch cycle most organizations run today. With Mandiant putting mean time to exploit at -7 days and CrowdStrike measuring 42 percent of bugs exploited before public disclosure, "patch within Microsoft's monthly Patch Tuesday cycle" is structurally too slow for KEV-class bugs. The defensive layer that compensates is detection: EDR/XDR on every host that supports it, network telemetry on edge devices that don't, and pre-staged isolation runbooks for high-exposure product categories (VPN gateways, file-transfer appliances, hypervisor management planes).

References

  1. JerryGamblin, "2025 CVE Data Review," January 2026: https://jerrygamblin.com/2026/01/01/2025-cve-data-review/

  2. JerryGamblin, "2024 CVE Data Review," January 2025: https://jerrygamblin.com/2025/01/05/2024-cve-data-review/

  3. NIST, "NIST Updates NVD Operations to Address Record CVE Growth," April 2026: https://www.nist.gov/news-events/news/2026/04/nist-updates-nvd-operations-address-record-cve-growth

  4. CISA Known Exploited Vulnerabilities Catalog: https://www.cisa.gov/known-exploited-vulnerabilities-catalog

  5. SecurityWeek, "CISA KEV Catalog Expanded 20% in 2025": https://www.securityweek.com/cisa-kev-catalog-expanded-20-in-2025-topping-1480-entries/

  6. Cybersecurity News, "CISA Expands KEV Catalog with 1,484 New Vulnerabilities": https://cybersecuritynews.com/cisa-expands-kev-catalog/

  7. Mandiant M-Trends 2026: https://cloud.google.com/blog/topics/threat-intelligence/m-trends-2026

  8. Mandiant M-Trends 2025: https://cloud.google.com/blog/topics/threat-intelligence/m-trends-2025/

  9. Google Cloud, "Look What You Made Us Patch: 2025 Zero-Days in Review": https://cloud.google.com/blog/topics/threat-intelligence/2025-zero-day-review

  10. Google Cloud, "Hello 0-Days, My Old Friend: A 2024 Zero-Day Exploitation Analysis": https://cloud.google.com/blog/topics/threat-intelligence/2024-zero-day-trends

  11. Verizon 2025 DBIR Executive Summary: https://www.verizon.com/business/resources/reports/2025-dbir-executive-summary.pdf

  12. IBM X-Force Threat Intelligence Index 2025: https://www.ibm.com/think/x-force/x-force-threat-intelligence-index-2025-attackers-steal-sell-user-identities

  13. IBM X-Force Threat Intelligence Index 2026: https://www.ibm.com/think/x-force/threat-intelligence-index-2026-securing-identities-ai-detection-risk-management

  14. Microsoft Digital Defense Report 2025: https://www.microsoft.com/en-us/security/security-insider/threat-landscape/microsoft-digital-defense-report-2025

  15. Microsoft Patch Tuesday 2025 Year in Review (Tenable): https://www.tenable.com/blog/microsoft-patch-tuesday-2025-year-in-review

  16. CrowdStrike 2026 Global Threat Report findings: https://www.crowdstrike.com/en-us/blog/crowdstrike-2026-global-threat-report-findings/

  17. Sonatype 2026 State of the Software Supply Chain (Open Source Malware): https://www.sonatype.com/state-of-the-software-supply-chain/2026/open-source-malware

  18. Synopsys OSSRA, 2024 announcement (covering 2023 codebases): https://news.synopsys.com/2024-02-27-New-Synopsys-Report-Finds-74-of-Codebases-Contained-High-Risk-Open-Source-Vulnerabilities,-Surging-54-Since-Last-Year

  19. Veracode 2025 State of Software Security: https://www.veracode.com/resources/analyst-reports/state-of-software-security-2025/

  20. Veracode security-debt press release: https://www.businesswire.com/news/home/20250227022178/en/Veracode-Reveals-Half-of-Organizations-Burdened-by-Critical-Security-Debt-with-70-Stemming-from-Third-party-Code-and-the-Software-Supply-Chain

  21. Trend Micro Zero Day Initiative, Pwn2Own: https://www.trendmicro.com/en_us/zero-day-initiative/pwn2own.html

  22. Trend Micro ZDI, "Pwn2Own: Researchers Earn $1 Million for 76 Zero-Days": https://www.trendmicro.com/en_us/research/26/a/pwn2own-researchers-earn-1-million-for-76-zero-days.html

  23. FIRST EPSS Special Interest Group: https://www.first.org/epss/

  24. FIRST EPSS Model documentation: https://www.first.org/epss/model

  25. VulnCheck, "Danger is Still Lurking in the NVD Backlog": https://www.vulncheck.com/blog/nvd-backlog-exploitation-lurking

  26. VulnCheck, "Enhancing Access to NIST NVD data": https://www.vulncheck.com/blog/nvd-cpe

  27. CSA Lab Space, "NVD Enrichment Triage": https://labs.cloudsecurityalliance.org/research/csa-research-note-nist-nvd-enrichment-policy-change-20260419/

  28. Vulnerability Blog, "2024 CVEs in Review": https://vulnerability.blog/2025/01/14/2024-cves-in-review/

  29. HackerOne 9th Annual Hacker-Powered Security Report: https://www.hackerone.com/report/hacker-powered-security

  30. HackerOne, "AI Vulnerability Reports +210%": https://www.hackerone.com/press-release/hackerone-report-finds-210-spike-ai-vulnerability-reports-amid-rise-ai-autonomy

  31. CitrixBleed 2 (CVE-2025-5777) NVD entry: https://nvd.nist.gov/vuln/detail/CVE-2025-5777

  32. Tenable, "CVE-2025-5777 / CVE-2025-6543 FAQ": https://www.tenable.com/blog/cve-2025-5777-cve-2025-6543-frequently-asked-questions-about-citrixbleed-2

  33. SOCRadar, CitrixBleed 2 NetScaler analysis: https://socradar.io/blog/cve-2025-5777-citrixbleed-2-netscaler-gateway-devices/

  34. Cleo CVE-2024-50623 NVD entry: https://nvd.nist.gov/vuln/detail/CVE-2024-50623

  35. Mandiant, "Ivanti Connect Secure VPN Targeted in New Zero-Day Exploitation": https://cloud.google.com/blog/topics/threat-intelligence/ivanti-connect-secure-vpn-zero-day

  36. Mandiant, "Suspected China-Nexus Threat Actor Actively Exploiting Critical Ivanti Vulnerability": https://cloud.google.com/blog/topics/threat-intelligence/china-nexus-exploiting-critical-ivanti-vulnerability

  37. The Hacker News, "CISA Adds CVE-2025-53521 to KEV": https://thehackernews.com/2026/03/cisa-adds-cve-2025-53521-to-kev-after.html

  38. Censys, "VMware vCenter Server Vulnerabilities Actively Exploited": https://censys.com/advisory/cve-2024-38813/

  39. Scott Moore, CNA Distribution Tracker: https://scottmoore.net/cna-ranking/index.html

  40. YesWeHack, "CVE Surge: Why the Record Rise": https://www.yeswehack.com/news/cve-surge-record-jump-vulnerabilities

2 views

1

X

Related reading

Full Account Takeover via Deeplinks: Mobile URL Handlers as ATO Vectors
Web App Security

Full Account Takeover via Deeplinks: Mobile URL Handlers as ATO Vectors

How attackers turn mobile deeplinks into full account takeover. Verified CVEs, named bug bounty disclosures, and a layered defender stack for mobile teams.

26 min read

GraphQL API Vulnerabilities and Common Attacks: A Technical Guide
Web App Security

GraphQL API Vulnerabilities and Common Attacks: A Technical Guide

Twelve verified GraphQL CVEs, OWASP API Top 10 mapping, real bug bounty disclosures, and a layered defender stack for security engineers and AppSec leads.

28 min read

Education Data Breach Statistics 2026: K-12 Ransomware and Higher Ed Trends
Network SecurityWeb App Security

Education Data Breach Statistics 2026: K-12 Ransomware and Higher Ed Trends

PowerSchool exposed 62M students. 251 ransomware attacks in 2025. 3.96M records breached, +27% YoY. K-12 SIX, MS-ISAC, Sophos, Comparitech sourced.

26 min read

Contents

    X