Microsoft Warns of Exchange Server Zero-Day Exploited in the Wild
Security WeekArchived May 15, 2026✓ Full text saved
Microsoft has shared mitigations for CVE-2026-42897 until a permanent patch can be released for affected Exchange Server versions. The post Microsoft Warns of Exchange Server Zero-Day Exploited in the Wild appeared first on SecurityWeek .
Full text archived locally
✦ AI Summary· Claude Sonnet
Microsoft Exchange Server users are urged to immediately mitigate a newly disclosed zero-day vulnerability that has been exploited in attacks.
Microsoft this week patched 137 vulnerabilities with its Patch Tuesday updates and the cybersecurity industry was surprised to see that the latest updates did not address any zero-days. However, a zero-day was disclosed just 48 hours later, on May 14.
The Exchange zero-day, tracked as CVE-2026-42897, has been described as a spoofing and XSS issue affecting Exchange Server Subscription Edition, 2016, and 2019.
“Improper neutralization of input during web page generation (‘cross-site scripting’) in Microsoft Exchange Server allows an unauthorized attacker to perform spoofing over a network,” Microsoft said in its advisory.
The company noted that the vulnerability affects Exchange Outlook Web Access (OWA) and an attacker can exploit it by sending a specially crafted email to the targeted user.
“If the user opens the email in Outlook Web Access and certain interaction conditions are met, arbitrary JavaScript can be executed in the browser context,” Microsoft explained.
Until a permanent patch is developed, Microsoft has shared a couple of mitigation options.
Microsoft has not shared any information on the attacks exploiting CVE-2026-42897. SecurityWeek has reached out to the company for clarification and will update this article if it responds.
An anonymous researcher has been credited for reporting the vulnerability.
It’s not uncommon for threat actors to target Exchange Server vulnerabilities — CISA’s KEV catalog currently lists nearly two dozen such flaws — but there do not appear to be any other reports of vulnerabilities discovered in 2025 and 2026 being exploited in the wild.
It’s worth noting that CVE-2026-42897 has yet to be added to CISA’s KEV list.
Related: Microsoft Patches Critical Zero-Click Outlook Vulnerability Threatening Enterprises
Related: Cisco Patches Another SD-WAN Zero-Day, the Sixth Exploited in 2026
Related: Ivanti Patches EPMM Zero-Day Exploited in Targeted Attacks
Related: Palo Alto Zero-Day Exploited in Campaign Bearing Hallmarks of Chinese State Hacking
WRITTEN BY
Eduard Kovacs
Eduard Kovacs (@EduardKovacs) is senior managing editor at SecurityWeek. He worked as a high school IT teacher before starting a career in journalism in 2011. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.
More from Eduard Kovacs
Akamai to Acquire AI and Browser Security Firm LayerX for $205 Million
G7 Countries Release AI SBOM Guidance
High-Severity Vulnerability Patched in VMware Fusion
Foxconn Confirms North American Factories Hit by Cyberattack
Microsoft, Palo Alto Networks Find Many Vulnerabilities by Using AI on Their Own Code
Microsoft Patches Critical Zero-Click Outlook Vulnerability Threatening Enterprises
Hundreds of Malicious Packages Force RubyGems to Suspend Registrations
ICS Patch Tuesday: New Security Advisories From Siemens, Schneider, CISA
Latest News
In Other News: Big Tech vs Canada Encryption Bill, Cisco’s Free AI Security Spec, Audi App Flaws
American Lending Center Data Breach Affects 123,000 Individuals
OpenAI Hit by TanStack Supply Chain Attack
TeamPCP Ups the Game, Releases Shai-Hulud Worm’s Source Code
Chrome 148 Update Patches Critical Vulnerabilities
Cisco Patches Another SD-WAN Zero-Day, the Sixth Exploited in 2026
Enhancing Data Center Security Without Sacrificing Performance
New Linux Kernel Vulnerability Fragnesia Allows Root Privilege Escalation
Trending
Webinar: Third-Party Risk In Practice
June 4, 2026
Organizations are investing heavily in third-party risk management, but breaches, delays, and blind spots continue to persist. Join this live webinar as we examine the gap between how organizations think their third-party risk programs are performing and what’s actually happening in practice.
Register
Virtual Event: Threat Detection And Incident Response Summit
May 20, 2026
Delve into big-picture strategies to reduce attack surfaces, improve patch management, conduct post-incident forensics, and tools and tricks needed in a modern organization.
Register
People on the Move
Tim Byrd has been appointed Chief Information Security Officer at First Citizens Bank.
IRONSCALES has named Steve McKenzie as Chief Operating Officer.
Silvio Pappalardo has joined AuthMind as Chief Revenue Officer.
More People On The Move
Expert Insights
Enhancing Data Center Security Without Sacrificing Performance
For AI data centers, where the stakes are the highest and performance constraints are the tightest, security and performance are no longer a zero-sum game. (Nadir Izrael)
Is The SOC Obsolete, And We Just Haven’t Admitted It Yet?
Many AI-first enterprises have already embraced sovereign architectures for general AI initiatives; cybersecurity—and the SOC—should be next. (Danelle Au)
The Mythos Moment: Enterprises Must Fight Agents With Agents
Only with the right platform and an agentic, AI-driven defense, will enterprises be able to protect themselves in the agentic era. (Etay Maor)
Why Cybersecurity Must Rethink Defense In The Age Of Autonomous Agents
From autonomous code generation to decision-making systems that initiate actions without human intervention, the industry is entering a new phase. (Torsten George)
Government Can’t Win The Cyber War Without The Private Sector
Securing national resilience now depends on faster, deeper partnerships with the private sector. (Steve Durbin)
Flipboard
Reddit
Whatsapp
Email