CVEQL New Beta Feature

CVEQL is CVEFeed's query language for searching vulnerabilities with precision. Write structured queries to filter CVEs by severity, CVSS score, affected products, CISA KEV status, EPSS scores, and more. Use dot notation to traverse related data and combine conditions with logical operators.

Query
Loading...
Results
Score
Vulnerability
Published

Examples

cvss_score >= 9.0
Critical vulnerabilities (CVSS 9+)
severity = "CRITICAL" and is_cisa_kev = True
CISA KEV critical CVEs
products.vendor.name = "apache"
Apache vulnerabilities
published >= "2025-01-01" and cvss_score >= 7.0
Recent high-severity CVEs
description ~ "buffer overflow"
Description contains text
cisa_kevs.known_ransomware_campaign_use = "known"
Known ransomware campaigns

Operators

= !=Equals / Not equals
> >= < <=Comparison
~ !~Contains / Not contains
inIn list
and or notLogical

Fields

idCVE ID
severityCRITICAL, HIGH, MEDIUM, LOW
cvss_scoreNumeric (0–10)
publishedDate
last_modifiedDate
descriptionText (use ~)
statusAnalyzed, Modified…
is_remoteBoolean
is_cisa_kevBoolean (virtual)
has_epssBoolean (virtual)
has_categoryVuln type

Related Fields (dot notation)

products.nameFull-text search
products.vendor.nameVendor name
cwes.nameWeakness name
cisa_kevs.date_addedKEV date
cisa_kevs.due_dateRemediation due
epss_scores.scoreProbability (0–1)
epss_scores.percentilePercentile (0–1)
Autocomplete is active — start typing to see field suggestions.
Results are limited to the last 90 days by default. Use published or last_modified in your query to override.
Guest limits: 5 queries/min, 5 sec timeout. Sign up for more.