SCA TRIAGE

Exploitability Context: How to Prioritize the Vulnerabilities That Actually Matter

Why Exploitability Context Matters for Application Security

The average enterprise carries a backlog of over 100,000 open vulnerabilities (Rezilion/Ponemon, 2023). With a 252-day mean time to remediation (Veracode State of Software Security, 2024), security teams are not falling behind because they lack scanners. They are falling behind because they cannot separate signal from noise.

CVSS scores assign ratings based on theoretical worst-case impact. They do not account for whether the vulnerable function is reachable, whether the application is internet-facing, or whether existing controls mitigate the risk. The result: 71-88% false positive rates across scanning tools (Black Duck 2025, JFrog 2025), with teams manually triaging thousands of findings that will never be exploited.

Organizations already run an average of 5.3 scanning tools (Ponemon, 2024). The problem is not detection. CVSS-based prioritization treats every “Critical” finding as equally urgent, when only 15% of CVEs are actually exploitable in practice (JFrog 2025). Exploitability context separates the 12-20% of findings that demand action from the 80-88% that do not.

100k+
Open vulnerabilities per enterprise
Rezilion/Ponemon, 2023
252 days
Mean time to remediation
Veracode SOSS, 2024
71-88%
False positive rates across scanning tools
Black Duck 2025, JFrog 2025
5.3
Average scanning tools per team
Ponemon, 2024
15%
Of Critical/High CVEs actually exploitable in practice
JFrog Software Supply Chain Report, 2025

How Exploitability Context Works

Exploitability context evaluates vulnerabilities across multiple dimensions rather than relying on a single severity score. Here is how the analysis layers together:

1

Reachability Analysis

The most impactful filter. Reachability analysis traces call graphs and data flows from your application code into third-party libraries to determine whether the vulnerable function is ever actually invoked.

Example

A scanner flags CVE-2024-XXXX as CRITICAL in a logging library. CVSS assigns it a 9.8 because remote code execution is theoretically possible. But reachability analysis shows that your application imports the library for structured logging only, and the vulnerable deserialize() method is never called from any reachable code path. Result: deprioritize.

This single check eliminates the majority of false positives in SCA findings, because most applications use only a fraction of any dependency’s API surface.

2

EPSS — Exploit Prediction Scoring System

EPSS, maintained by FIRST.org, provides a probability score (0-1.0) estimating the likelihood that a vulnerability will be exploited in the wild within the next 30 days. Unlike CVSS, which measures theoretical severity, EPSS measures real-world threat activity.

Metric Measures Source Updates
CVSS Theoretical severity NVD, vendor advisory Static after publication
EPSS Exploitation probability Observed exploit activity, threat intel Daily
CISA KEV Confirmed exploitation U.S. government incident data As incidents are verified

A vulnerability with CVSS 9.8 but EPSS 0.02 (2% exploitation probability) should be treated differently than one with CVSS 7.5 but EPSS 0.85 (85% probability). EPSS adds the threat intelligence layer that CVSS cannot provide.

3

CISA Known Exploited Vulnerabilities (KEV)

The CISA KEV catalog lists vulnerabilities confirmed to be actively exploited in real attacks. KEV entries override all other prioritization signals and demand immediate remediation. Federal agencies must remediate KEV entries within defined timelines under Binding Operational Directive 22-01, but the catalog has become a de facto priority list for private sector organizations as well.

4

Production Context

Exploitability context also incorporates environmental factors specific to your deployment:

  • Internet-facing exposure: Is the vulnerable service accessible from the public internet, or isolated behind a VPN?
  • Sensitive data access: Does the component handle PII, financial data, or authentication credentials?
  • Business criticality: Is this a revenue-generating production service or an internal development tool?
  • Existing controls: Are there WAF rules, network segmentation, or authentication layers that mitigate the attack path?
5

Forrester’s Seven Dimensions of Vulnerability Prioritization

Forrester’s SCA evaluation criteria identify seven dimensions for mature vulnerability prioritization (Forrester Wave: Software Composition Analysis, 2024): severity (CVSS), exploitability (EPSS, known exploits), reachability (call graph analysis), deployment context (internet-facing, data sensitivity), business impact (revenue risk, compliance), fix availability (safe upgrade path, breaking change risk), and threat intelligence (CISA KEV, active campaigns).

No single dimension is sufficient. Exploitability context synthesizes all seven into an actionable prioritization decision.

How Pixee Addresses Exploitability Context

Pixee’s Agentic Security Engineering Platform uses exploitability context as the foundation for both triage and remediation. This is not a reporting feature. It is the engine that drives automated decision-making across the entire vulnerability lifecycle.

Triage
95%

False Positive Reduction

Pixee ingests findings from 10+ scanner tools (Snyk, Veracode, Checkmarx, SonarQube, GitHub Advanced Security, and others) and applies exploitability analysis to each finding. By combining reachability verification, EPSS scoring, CISA KEV cross-referencing, and production context, Pixee reduces the actionable finding set by 95%.

This means a team that previously triaged 2,000 findings per sprint now reviews approximately 40 high-confidence findings that warrant action. The remaining 1,960 are automatically classified with evidence (not silently suppressed), so auditors and security leads can verify the reasoning.

Remediation
76%

Merge Rate on Prioritized Fixes

Once exploitability context identifies the findings that matter, Pixee generates context-aware code fixes for those prioritized vulnerabilities. Because the fix queue is filtered to real risk rather than scanner noise, every generated pull request targets a vulnerability that is actually exploitable, reachable, and relevant to the production environment.

The result: a 76% merge rate across 100,000+ pull requests. Developers merge Pixee’s fixes because they address real problems, match existing code conventions, and include breaking change detection (80-90% confidence) to prevent production regressions.

The workflow: Exploitability context (triage) produces a prioritized fix queue. The fix queue feeds automated remediation. Remediation produces merge-ready PRs. The cycle completes without manual triage as the bottleneck.

Industry Validation

The shift toward exploitability-based prioritization is an industry-wide movement:

  • Forrester now evaluates SCA vendors on reachability analysis as table stakes (Forrester Wave: SCA, 2024).
  • CISA published guidance urging risk-based prioritization over CVSS-only approaches (CISA SSVC, 2022).
  • FIRST.org developed EPSS because “CVSS was never designed for prioritization” (FIRST EPSS documentation, 2023).
  • JFrog found only 15% of Critical/High CVEs were actually exploitable (Software Supply Chain Report, 2025).

Organizations that adopt exploitability-based prioritization report 60-90% reductions in triage workload without increasing breach risk.

Frequently Asked Questions

Exploitability context is the practice of evaluating whether a vulnerability can actually be exploited in a specific application environment, rather than relying solely on CVSS severity scores. It combines reachability analysis (is the vulnerable code called?), EPSS scoring (is the vulnerability being exploited in the wild?), CISA KEV status, and deployment factors like internet exposure and data sensitivity to focus remediation on the 12-20% of findings that pose genuine risk.

CVSS measures the theoretical maximum impact of a vulnerability in a worst-case scenario. It does not consider your specific application, deployment environment, or whether the vulnerable function is reachable. Exploitability context layers multiple signals — reachability analysis, EPSS exploitation probability, CISA KEV confirmation, and production deployment data — to determine whether a vulnerability is exploitable in YOUR environment. A CVSS 9.8 vulnerability in a function your application never calls poses less real risk than a CVSS 6.5 vulnerability in an internet-facing authentication endpoint.

Exploitability context transforms remediation from “fix everything” (impossible at scale) to “fix what matters” (achievable and impactful). By filtering out the 80-88% of findings that are not exploitable in your environment, security teams can focus remediation resources on the vulnerabilities that genuinely reduce breach risk. This prioritized approach is what enables Pixee to achieve a 76% merge rate on automated fixes — every generated pull request targets a real, exploitable vulnerability rather than scanner noise.