Home
World Journal of Advanced Research and Reviews
International Journal with High Impact Factor for fast publication of Research and Review articles

Main navigation

  • Home
    • Journal Information
    • Editorial Board Members
    • Reviewer Panel
    • Abstracting and Indexing
    • Journal Policies
    • Our CrossMark Policy
    • Publication Ethics
    • Issue in Progress
    • Current Issue
    • Past Issues
    • Instructions for Authors
    • Article processing fee
    • Track Manuscript Status
    • Get Publication Certificate
    • Join Editorial Board
    • Join Reviewer Panel
  • Contact us
  • Downloads

eISSN: 2581-9615 || CODEN: WJARAI || Impact Factor 8.2 ||  CrossRef DOI

Research and review articles are invited for publication in May 2026 (Volume 30, Issue 2) Submit manuscript

Explainable Risk-Based Vulnerability Prioritization in Hybrid Cloud: Integrating CVSS, EPSS, and CISA KEV with Asset Criticality Signals

Breadcrumb

  • Home
  • Explainable Risk-Based Vulnerability Prioritization in Hybrid Cloud: Integrating CVSS, EPSS, and CISA KEV with Asset Criticality Signals

Kelvin Gyimah Agyei 1, *, Marlon Bryce Monjoma 2, Claude Anesu Samushonga 3, Hilton Hatitye Chisora 3, Tendai Nemure 3, Salvation Gwangwava 3 and Munashe Naphtali Mupa 4

1 University of Memphis.
2 Pace University.
3 Yeshiva University.
4 Hult International Business School.

Research Article

World Journal of Advanced Research and Reviews, 2026, 30(01), 2044-2052

Article DOI: 10.30574/wjarr.2026.30.1.1006

DOI url: https://doi.org/10.30574/wjarr.2026.30.1.1006

Received on 09 March 2026; revised on 19 April 2026; accepted on 22 April 2026

The paper describes a risk-based, explainable vulnerability prioritization scheme that is specific to a hybrid cloud environment, incorporates CVSS (severity), EPSS (probability of exploitation), CISA KEV (evidence of active exploitation), and asset criticality indicators (criticality tier, exposure, compensating controls), to make optimal remediation decisions. The hybrid clouds, which consist of on-premises, public (AWS, Azure, Google Cloud), and private cases, generate dynamic and fragmented surfaces of attack, with temporary assets and collective security efforts. By 2025, the NVD will have published to the database around 48,185 new CVEs (an increase of 20.6% over 2024), bringing the overall count to more than 308,000 and producing tens of thousands of findings per scan cycle in an average enterprise. Conventional CVSS-only prioritization causes alert fatigue, ineffective utilization of resources and long-term exposure since scores are fixed, theoretical, and context-independent, and do not correlate well with actual exploitation.
The framework combines these signals into a clear weighted linear composite score, augmented with rule-based overrides (e.g. KEV-listed CVEs automatically escalate to Critical) and a transparency layer, which gives contribution breakdowns, natural-language descriptions, and audit-readable logs. Simulated hybrid dataset (approximately 25,000 vulnerabilities on 12,000 asset) evaluations have demonstrated 80-95 percent decrease in urgent remediation tasks compared to CVSS baseline, 85-92 percent exploit vulnerability recall, efficiency ratio of about 4.7 times, and a reduction in exposure period of high-risk items to around 9 days versus 41 days. The internet-facing critical assets were properly raised by the Hybrid-specific context amplification.
This provides a lightweight, interpretable model that can be deployed using existing tools/APIs and governance-aligned transparency that can be audited and reported using ISO 27001/SOC 2 tools and executive reporting. Guidelines on implementation include workflows, SLAS (e.g. 7 days in case of KEV) and dashboards. Limitations (e.g. dependency on asset tagging, non-linearity in KEV) are identified, and directions of future research, which may potentially include non-linear ML with SHAP explainability and cloud-native signals are noted.

Cloud; Hybrid; Signals; Vulnerability

https://wjarr.com/sites/default/files/fulltext_pdf/WJARR-2026-1006.pdf

Preview Article PDF

Kelvin Gyimah Agyei, Marlon Bryce Monjoma, Claude Anesu Samushonga, Hilton Hatitye Chisora, Tendai Nemure, Salvation Gwangwava and Munashe Naphtali Mupa. Explainable Risk-Based Vulnerability Prioritization in Hybrid Cloud: Integrating CVSS, EPSS, and CISA KEV with Asset Criticality Signals. World Journal of Advanced Research and Reviews, 2026, 30(01), 2044-2052. Article DOI: https://doi.org/10.30574/wjarr.2026.30.1.1006

Copyright © Author(s). All rights reserved. This article is published under the terms of the Creative Commons Attribution 4.0 International License (CC BY 4.0), which permits use, sharing, adaptation, distribution, and reproduction in any medium or format, as long as appropriate credit is given to the original author(s) and source, a link to the license is provided, and any changes made are indicated.


All statements, opinions, and data contained in this publication are solely those of the individual author(s) and contributor(s). The journal, editors, reviewers, and publisher disclaim any responsibility or liability for the content, including accuracy, completeness, or any consequences arising from its use.

Get Certificates

Get Publication Certificate

Download LoA

Check Corssref DOI details

Issue details

Issue Cover Page

Editorial Board

Table of content

Copyright © 2026 World Journal of Advanced Research and Reviews - All rights reserved

Developed & Designed by VS Infosolution