Active exploitation of Microsoft Exchange Server spoofing vulnerability via crafted email
Updated: 15.05.2026 12:40
· First: 15.05.2026 09:19
· 📰 2 src / 2 articles
A high-severity spoofing vulnerability in on-premises Microsoft Exchange Server (CVE-2026-42897, CVSS 8.1) is being actively exploited in the wild. The flaw arises from improper neutralization of input during web page generation, enabling cross-site scripting (XSS) that permits unauthorized spoofing over a network. Attackers can exploit this by sending a specially crafted email to a user; when opened in Outlook Web Access under specific interaction conditions, arbitrary JavaScript can execute in the browser context, facilitating further unauthorized actions. Microsoft has confirmed active exploitation and reports that patches are not yet available, with mitigation provided via the Exchange Emergency Mitigation Service (EEMS) for Exchange Server 2016, 2019, and Subscription Edition (SE) on-premises servers. Patch availability for some versions is restricted to customers enrolled in the Period 2 Exchange Server ESU program.