CVEQL New Beta Feature

CVEQL is CVEFeed's query language for searching vulnerabilities with precision. Write structured queries to filter CVEs by severity, CVSS score, affected products, CISA KEV status, EPSS scores, and more. Use dot notation to traverse related data and combine conditions with logical operators.

Query
Loading...
Results
Score
Vulnerability
Published

Examples

cvss_score >= 9.0
Critical vulnerabilities (CVSS 9+)
severity = "CRITICAL" and is_cisa_kev = True
CISA KEV critical CVEs
products.vendor.name = "apache"
Apache vulnerabilities
published >= "2025-01-01" and cvss_score >= 7.0
Recent high-severity CVEs
description ~ "buffer overflow"
Description contains text
cisa_kevs.known_ransomware_campaign_use = "known"
Known ransomware campaigns

Operators

= != Equals / Not equals
> >= < <= Comparison
~ !~ Contains / Not contains
in In list
and or not Logical

Fields

id CVE ID
severity CRITICAL, HIGH, MEDIUM, LOW
cvss_score Numeric (0–10)
published Date
last_modified Date
description Text (use ~)
status Analyzed, Modified…
is_remote Boolean
is_cisa_kev Boolean (virtual)
has_epss Boolean (virtual)
has_category Vuln type

Related Fields (dot notation)

products.name Full-text search
products.vendor.name Vendor name
cwes.name Weakness name
cisa_kevs.date_added KEV date
cisa_kevs.due_date Remediation due
epss_scores.score Probability (0–1)
epss_scores.percentile Percentile (0–1)
Autocomplete is active — start typing to see field suggestions.
Results are limited to the last 90 days by default. Use published or last_modified in your query to override.
Guest limits: 5 queries/min, 5 sec timeout. Sign up for more.