A critical zero-day spoofing vulnerability, CVE-2026-42897, affecting on-premises Microsoft Exchange Server installations is under active exploitation. The flaw is a Cross-Site Scripting (XSS) vulnerability within Outlook Web Access (OWA) that allows an unauthenticated attacker to execute arbitrary JavaScript in the victim's browser by tricking them into opening a specially crafted email. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added CVE-2026-42897 to its Known Exploited Vulnerabilities (KEV) Catalog, underscoring the urgency of the threat. Microsoft has acknowledged the exploitation and released mitigation guidance while working on a permanent security patch. Exchange Online customers are not affected.
The vulnerability, CVE-2026-42897, is classified as a spoofing flaw but is technically a stored Cross-Site Scripting (XSS) vulnerability. It stems from improper neutralization of input during web page generation within the Outlook Web Access (OWA) component.
The attack chain is straightforward but effective:
Because the script runs in the user's browser, it inherits the permissions and access of that user's authenticated session, making it a powerful tool for corporate espionage and internal reconnaissance.
The vulnerability impacts the following on-premises Microsoft Exchange Server versions:
Important: Microsoft Exchange Online is not affected by this vulnerability.
Microsoft has confirmed that CVE-2026-42897 is being actively exploited in limited, targeted attacks. On May 15, 2026, CISA added the vulnerability to its KEV catalog, indicating verified exploitation in the wild and requiring U.S. federal agencies to apply Microsoft's mitigations by a specified deadline. The public disclosure of a zero-day that was not fixed in the scheduled Patch Tuesday update suggests the exploitation was discovered very recently, forcing an out-of-band response.
The business impact of this vulnerability is high, particularly for organizations that rely heavily on on-premises Exchange and OWA for remote access. Successful exploitation can lead to:
The following patterns could indicate related activity and may be useful for threat hunting:
url_pattern/owa/string_pattern<script>, onerror=, onload=, eval()network_traffic_patternOutbound connections from OWA servers to non-standard IPslog_sourceExchange IIS LogsSecurity teams should focus on analyzing web logs from their Exchange servers and monitoring for signs of post-exploitation activity.
%SystemDrive%\inetpub\logs\LogFiles\W3SVC1) into your SIEM. Create detection rules to alert on requests to OWA containing suspicious strings like <script>, alert(), javascript:, or obfuscated variations. D3FEND's URL Analysis (D3-UA) is a key technique here.If exploitation is suspected:
As a permanent patch is not yet available, organizations must implement Microsoft's provided mitigations immediately.
New CVSS scores (8.1/6.1) and expanded detection/hunting methods provided for the actively exploited Exchange zero-day, CVE-2026-42897, with further impact details.
The primary long-term mitigation is to apply the security patch from Microsoft as soon as it becomes available.
Mapped D3FEND Techniques:
Use a Web Application Firewall (WAF) or the provided URL Rewrite rules to filter and block malicious requests containing XSS payloads before they reach the Exchange server.
Reduce the attack surface by restricting network access to OWA to only trusted IP ranges or requiring VPN access.
Mapped D3FEND Techniques:
Enforce MFA on OWA to prevent attackers from using stolen session tokens or credentials from untrusted locations.
Mapped D3FEND Techniques:
In the absence of a patch for CVE-2026-42897, immediate application configuration hardening is the most critical defensive measure. Organizations must implement the specific mitigation steps provided by Microsoft. This typically involves applying URL Rewrite rules within IIS on the Exchange front-end servers. These rules act as a virtual patch by inspecting incoming requests to OWA and blocking those that match known malicious patterns associated with this XSS attack. Security teams should deploy these rules to all internet-facing Exchange 2016, 2019, and SE servers. It is crucial to test the rules in a non-production environment first to ensure they do not disrupt legitimate user traffic. After deployment, monitor IIS and URL Rewrite logs to verify that the rules are working and to detect any ongoing exploitation attempts. This technique directly hardens the OWA application against the specific attack vector, providing a crucial stopgap until a permanent software update is available.
To detect potential post-exploitation activity from a compromised OWA session, security teams should implement robust Network Traffic Analysis (NTA). Focus monitoring on egress traffic originating from the Exchange OWA front-end servers. A compromised session could be used to exfiltrate data or establish a C2 channel. Establish a baseline of normal outbound traffic from these servers; they should typically have very limited, predictable outbound communication. Configure alerts for any anomalous connections, such as traffic to unusual IP addresses, non-standard ports, or known malicious domains. Pay close attention to the volume and patterns of data transfer. A sudden spike in outbound data from an OWA server could indicate data exfiltration. Using NetFlow, Zeek, or a full packet capture solution can provide the necessary visibility to detect these subtle indicators of compromise, allowing for a rapid response before an attacker can pivot deeper into the network.
URL Analysis is a primary detection method for identifying attempts to exploit CVE-2026-42897. Security teams should configure their SIEM, WAF, or other log analysis platforms to scrutinize the query strings and POST bodies of all requests sent to /owa/ paths. Detections should be built to flag the presence of HTML tags, JavaScript keywords, and special characters commonly used in XSS attacks. Specifically, look for patterns like <script>, onerror=, onload=, javascript:, eval(), and URL-encoded or hexadecimal representations of these strings. Since attackers will likely obfuscate their payloads, detection logic should be flexible enough to identify partial matches and suspicious character combinations. This analysis should be performed in near real-time to enable rapid alerting. This technique helps identify not only successful exploitation but also the reconnaissance and failed attempts, providing valuable threat intelligence on who is targeting the organization.
Microsoft discloses the zero-day vulnerability CVE-2026-42897, two days after the scheduled Patch Tuesday.
CISA adds CVE-2026-42897 to its Known Exploited Vulnerabilities (KEV) Catalog.
Microsoft provides temporary mitigation steps for affected organizations.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats
Every tactic, technique, and sub-technique used in this threat has been identified and mapped to the MITRE ATT&CK framework for consistent, actionable threat language.
Observables and indicators of compromise (IOCs) have been extracted and cataloged. Risk has been assessed and correlated with known threat actors and historical campaigns.
Detection rules, incident response steps, and D3FEND-aligned mitigation strategies are included so your team can act on this intelligence immediately.
Structured threat data is packaged as a STIX 2.1 bundle and can be visualized as an interactive graph — relationships between actors, malware, techniques, and indicators.
Sigma detection rules are derived from the threat techniques in this article and can be converted for deployment across any major SIEM or EDR platform.