CVEQL New Beta Feature
CVEQL is CVEFeed's query language for searching vulnerabilities with precision. Write structured queries to filter CVEs by severity, CVSS score, affected products, CISA KEV status, EPSS scores, and more. Use dot notation to traverse related data and combine conditions with logical operators.
Query
Results
Examples
cvss_score >= 9.0
severity = "CRITICAL" and is_cisa_kev = True
products.vendor.name = "apache"
published >= "2025-01-01" and cvss_score >= 7.0
description ~ "buffer overflow"
cisa_kevs.known_ransomware_campaign_use = "known"
Operators
= !=
|
Equals / Not equals |
> >= < <=
|
Comparison |
~ !~
|
Contains / Not contains |
in
|
In list |
and or not
|
Logical |
Fields
id
|
CVE ID |
severity
|
CRITICAL, HIGH, MEDIUM, LOW |
cvss_score
|
Numeric (0–10) |
published
|
Date |
last_modified
|
Date |
description
|
Text (use ~)
|
status
|
Analyzed, Modified… |
is_remote
|
Boolean |
is_cisa_kev
|
Boolean (virtual) |
has_epss
|
Boolean (virtual) |
has_category
|
Vuln type |
Related Fields (dot notation)
products.name
|
Full-text search |
products.vendor.name
|
Vendor name |
cwes.name
|
Weakness name |
cisa_kevs.date_added
|
KEV date |
cisa_kevs.due_date
|
Remediation due |
epss_scores.score
|
Probability (0–1) |
epss_scores.percentile
|
Percentile (0–1) |
published or last_modified in your query to override.