Microsoft has disclosed a new zero-day vulnerability, CVE-2026-42897, affecting on-premises Microsoft Exchange Server installations. The vulnerability, a cross-site scripting (XSS) and spoofing flaw, is confirmed to be under active exploitation by unspecified threat actors. It impacts Exchange Server 2016, 2019, and Subscription Edition. Due to the lack of a security patch in the recent May 2026 Patch Tuesday cycle, Microsoft is urging administrators to apply immediate mitigations. The primary recommendation is to enable the Exchange Emergency Mitigation Service (EEMS), which can automatically apply interim fixes to protect against this and future threats. The vulnerability allows a remote, unauthenticated attacker to conduct spoofing attacks against Outlook Web Access (OWA), potentially leading to credential theft or further social engineering.
CVE-2026-42897 is an improper neutralization of input during web page generation, commonly known as a cross-site scripting (XSS) vulnerability. This flaw resides in the Outlook Web Access (OWA) component of on-premises Exchange Servers.
An unauthenticated attacker can send a specially crafted request to a vulnerable Exchange server. If a user interacts with the malicious link or content generated by the attacker, the XSS payload will execute in the context of the user's browser session. This can be leveraged for spoofing attacks, where the attacker makes malicious content appear to originate from a legitimate source, or to steal the user's session cookies, potentially granting the attacker unauthorized access to the user's mailbox and other resources.
Important Note: Exchange Online is not affected by this vulnerability.
Microsoft has confirmed that CVE-2026-42897 is being actively exploited in the wild. The details of the threat actors and the scale of the attacks have not been disclosed. However, the confirmation of in-the-wild exploitation elevates the urgency for all organizations running on-premises Exchange servers to take immediate action. As of the initial report, the vulnerability had not yet been added to the CISA Known Exploited Vulnerabilities (KEV) catalog, but its status as an actively exploited Exchange zero-day makes its inclusion likely.
Successful exploitation of this vulnerability can lead to significant security incidents. While categorized as a "spoofing" flaw, the underlying XSS can have severe consequences:
Given that Exchange servers are a high-value target, a compromise can serve as an initial access vector for broader network intrusions, including ransomware deployment.
No specific Indicators of Compromise (IPs, domains, hashes) were mentioned in the source articles.
Security teams may want to hunt for the following patterns which could indicate exploitation attempts against CVE-2026-42897:
/owa/auth/logon.aspxw3wp.exe process logs for suspicious requests containing script tags (<script>, </script>), encoded characters, or event handlers (onload, onerror) in URL parameters.powershell.exew3wp.exe process associated with OWA application pools, a common post-exploitation step.<script>, eval(, document.cookie, or other JavaScript code fragments. Use SIEM rules to alert on these patterns. A D3FEND technique for this is Web Session Activity Analysis.w3wp.exe process for anomalous behavior, such as spawning cmd.exe or powershell.exe.Until a permanent security update is available, organizations should prioritize the following actions:
Software Update in principle, applying a vendor-supplied fix.CISA adds CVE-2026-42897 to KEV catalog, mandating federal agency action and confirming active exploitation via malicious emails.
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added CVE-2026-42897 to its Known Exploited Vulnerabilities (KEV) Catalog on May 15, 2026. This inclusion mandates U.S. federal agencies to apply Microsoft's mitigations by a specified deadline, underscoring the heightened urgency and confirmed widespread exploitation of the zero-day. The vulnerability, a stored Cross-Site Scripting (XSS) flaw in Outlook Web Access (OWA), is exploited when a user opens a specially crafted email containing a malicious JavaScript payload. This allows attackers to execute arbitrary code in the victim's browser, potentially leading to session hijacking, credential theft, and lateral movement within the network. Microsoft continues to work on a permanent patch.
CISA adds actively exploited Microsoft Exchange zero-day (CVE-2026-42897) to KEV catalog, mandating federal agencies to apply mitigations by May 29, 2026.
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added the actively exploited Microsoft Exchange zero-day, CVE-2026-42897, to its Known Exploited Vulnerabilities (KEV) catalog. This inclusion mandates federal agencies to apply mitigations by May 29, 2026, underscoring the critical nature of the flaw. The vulnerability, rated CVSS 8.1, is an XSS issue allowing attackers to execute arbitrary JavaScript by sending a specially crafted email that, when opened in Outlook Web Access (OWA), can lead to credential theft. New detection methods include deploying Web Application Firewalls (WAFs) and enhanced IIS log analysis for XSS payloads. Organizations are urged to apply Microsoft's provided mitigations immediately.
Microsoft discloses CVE-2026-42897 and confirms it is being actively exploited in the wild.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats
Every tactic, technique, and sub-technique used in this threat has been identified and mapped to the MITRE ATT&CK framework for consistent, actionable threat language.
Observables and indicators of compromise (IOCs) have been extracted and cataloged. Risk has been assessed and correlated with known threat actors and historical campaigns.
Detection rules, incident response steps, and D3FEND-aligned mitigation strategies are included so your team can act on this intelligence immediately.
Structured threat data is packaged as a STIX 2.1 bundle and can be visualized as an interactive graph — relationships between actors, malware, techniques, and indicators.
Sigma detection rules are derived from the threat techniques in this article and can be converted for deployment across any major SIEM or EDR platform.