CyberHappenings logo

Track cybersecurity events as they unfold. Sourced timelines. Filter, sort, and browse. Fast, privacy‑respecting. No invasive ads, no tracking.

Active exploitation of Microsoft Exchange Server spoofing vulnerability via crafted email

First reported
Last updated
1 unique sources, 1 articles

Summary

Hide ▲

A high-severity spoofing vulnerability in on-premises Microsoft Exchange Server (CVE-2026-42897, CVSS 8.1) is being actively exploited in the wild. The flaw arises from improper neutralization of input during web page generation, enabling cross-site scripting (XSS) that permits unauthorized spoofing over a network. Attackers can exploit this by sending a specially crafted email to a user; when opened in Outlook Web Access under specific interaction conditions, arbitrary JavaScript can execute in the browser context, facilitating further unauthorized actions.

Timeline

  1. 15.05.2026 09:19 1 articles · 2h ago

    Active exploitation of Microsoft Exchange Server spoofing vulnerability CVE-2026-42897

    Microsoft disclosed CVE-2026-42897, a high-severity (CVSS 8.1) spoofing vulnerability in on-premises Exchange Server versions 2016, 2019, and Subscription Edition. The flaw stems from improper input neutralization leading to XSS, enabling unauthorized spoofing and arbitrary JavaScript execution in the browser context when a crafted email is opened in Outlook Web Access under specific interaction conditions. Microsoft reported active exploitation in the wild and provided temporary mitigations via the Exchange Emergency Mitigation Service (enabled by default) and the Exchange on-premises Mitigation Tool (EOMT). Exchange Online is not impacted.

    Show sources

Information Snippets