As the Information Security Manager, you are reviewing a report on vulnerabilities found in your company's public-facing applications. One vulnerability is rated as high-risk but has a low exploitability score. How should you prioritize its remediation?