Microsoft has confirmed a new high-severity zero-day vulnerability, CVE-2026-42897, is being actively exploited in the wild. The vulnerability is a cross-site scripting (XSS) flaw affecting on-premises versions of Microsoft Exchange Server (2016, 2019, and Subscription Edition) and carries a CVSS score of 8.1. An attacker can exploit this flaw by sending a specially crafted email, which, when opened in Outlook Web Access (OWA), can lead to arbitrary code execution in the user's browser context. Microsoft has not yet released a full security update but has provided automatic mitigations via its Exchange Emergency Mitigation (EM) Service and has made manual scripts available for air-gapped systems. Exchange Online is not affected.
The vulnerability, CVE-2026-42897, is classified as an improper neutralization of input during web page generation, resulting in a Cross-Site Scripting (XSS) vulnerability. It specifically impacts Outlook Web Access (OWA), the web-based client for Exchange Server.
The attack vector requires an attacker to send a specially crafted email to a target user. For the exploit to trigger, the user must open this malicious email within OWA and perform certain interactions. If these conditions are met, the vulnerability allows the attacker to execute arbitrary JavaScript code within the security context of the victim's browser session. This can be used to perform actions on behalf of the user, steal session cookies, or conduct network-based spoofing attacks.
Microsoft has confirmed that CVE-2026-42897 is being actively exploited in the wild. However, details about the threat actors involved, the scale of the attacks, or the specific post-exploitation activities have not been disclosed. The vulnerability was reported to Microsoft by an anonymous researcher.
The vulnerability affects the following on-premises Microsoft Exchange Server versions:
Important: Microsoft Exchange Online is not affected by this vulnerability.
While the CVSS score is 8.1 (High), the impact of a successful exploit can be significant. By executing code in the user's browser, an attacker can:
The requirement for user interaction (opening a specific email in OWA) makes this less severe than a zero-click RCE flaw, but the active exploitation makes it a serious threat for organizations running on-premises Exchange.
Security teams should focus on identifying vulnerable servers and monitoring for signs of exploitation. The following patterns may help identify vulnerable or compromised systems:
HealthChecker.ps1) to verify the version of your Exchange servers and confirm if they are vulnerable.C:\inetpub\logs\LogFiles\W3SVC1\) for unusual requests or suspicious patterns that might indicate XSS payloads. Look for long, encoded strings in URL parameters or POST bodies that are not typical for OWA traffic.w3wp.exe process associated with the OWA application pool.Since a full security update is not yet available, organizations must rely on the mitigations provided by Microsoft.
Enable and Verify the Exchange Emergency Mitigation (EM) Service:
HealthChecker.ps1) to confirm the mitigation is applied. The script is the most reliable way to check the status.Manual Mitigation for Disconnected Systems:
EOMT.ps1).Warning: These mitigations are temporary. Organizations must plan to install the full security update as soon as it is released by Microsoft, as mitigations can sometimes be bypassed by determined attackers.
Apply the official security update from Microsoft as soon as it becomes available. This is the only permanent fix.
The mitigation provided by Microsoft uses URL Rewrite rules to filter and block the malicious requests that trigger the XSS flaw.
Train users to be cautious of unexpected or unusual emails, even from known senders, as user interaction is required to trigger the exploit.
Microsoft discloses the active exploitation of CVE-2026-42897 and provides mitigation guidance.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats
Every tactic, technique, and sub-technique used in this threat has been identified and mapped to the MITRE ATT&CK framework for consistent, actionable threat language.
Observables and indicators of compromise (IOCs) have been extracted and cataloged. Risk has been assessed and correlated with known threat actors and historical campaigns.
Detection rules, incident response steps, and D3FEND-aligned mitigation strategies are included so your team can act on this intelligence immediately.
Structured threat data is packaged as a STIX 2.1 bundle and can be visualized as an interactive graph — relationships between actors, malware, techniques, and indicators.
Sigma detection rules are derived from the threat techniques in this article and can be converted for deployment across any major SIEM or EDR platform.