Morning Overview

Microsoft confirms hackers are already exploiting an on-premise Exchange zero-day — one crafted email triggers code inside your browser

A single malicious email, opened or even previewed in a browser, can now execute attacker-controlled code inside your session. No clicks, no attachments, no links to follow. Microsoft has confirmed that CVE-2026-42897, a stored cross-site scripting vulnerability in on-premise Exchange Server, is already being exploited in real-world attacks. The company, acting as the CVE Numbering Authority, assigned the flaw a vendor-rated CVSS 3.1 score of 8.1 (HIGH), and in May 2026, CISA added it to the Known Exploited Vulnerabilities catalog, a step the agency reserves exclusively for flaws with confirmed in-the-wild abuse.

If your organization still runs Exchange on its own servers, this is not a vulnerability you can afford to queue behind routine maintenance.

How the attack works

CVE-2026-42897 is classified as improper neutralization of input during web page generation, the formal name for a stored XSS bug. An attacker crafts an email containing embedded malicious script. When anyone opens or previews that message through Outlook on the web (OWA) or another browser-based Exchange interface, the script fires inside the victim’s authenticated browser session. From there, the attacker can steal session tokens, harvest credentials, exfiltrate mailbox data, or pivot deeper into the organization’s environment.

The critical distinction: this is not a phishing attack that depends on a user clicking a suspicious link or downloading a file. The payload executes the moment the email renders in the browser. That makes user awareness training irrelevant as a defense against this specific vector. The burden falls entirely on technical controls.

Severity scores and what the gap between them means

Microsoft, acting as the CVE Numbering Authority, assigned CVE-2026-42897 a vendor-rated CVSS 3.1 score of 8.1 (HIGH). The NVD entry includes a separate enrichment score of 6.1 (MEDIUM), produced through NIST’s own independent analysis process.

The 2-point gap reflects different assumptions about attack preconditions. Microsoft’s higher vendor-assigned score likely factors in how broadly Exchange web interfaces are exposed across large enterprises: once a crafted email lands in any mailbox, the attack surface is wide. NVD’s enrichment methodology may weight certain preconditions differently, such as whether the attacker needs prior authentication or whether the victim must be using a specific client configuration. Both scores agree the flaw warrants urgent remediation.

Why CISA’s KEV listing matters

CISA does not add vulnerabilities to the Known Exploited Vulnerabilities catalog based on theoretical risk. Inclusion requires credible evidence of active exploitation. Federal civilian agencies are typically required to remediate KEV-listed flaws within strict deadlines, and private-sector security teams across industries use the catalog as a top-priority filter for patching decisions. The KEV entry for CVE-2026-42897 (searchable by CVE ID in the CISA KEV catalog), combined with Microsoft’s own security advisory, creates a documented chain from vendor confirmation through federal cataloging of real-world abuse.

Who is affected and who is not

The vulnerability targets on-premise Exchange Server. The only currently supported on-premise versions are Exchange Server 2016 and Exchange Server 2019. Organizations running either version should assume they are vulnerable until they have confirmed their patch level against Microsoft’s advisory.

Exchange Online and Microsoft 365 cloud-hosted mail are not affected. Cloud customers receive fixes through Microsoft’s own update pipeline. On-premise administrators must download, test, and deploy patches manually, a process that often lags by days or weeks due to maintenance windows and compatibility testing.

Older, unsupported Exchange versions (2010, 2013) may also be vulnerable but are unlikely to receive patches. Organizations still running those versions face compounding risk and should treat this disclosure as an urgent catalyst for migration planning.

One point the available records do not clarify: whether the Outlook desktop client is also a rendering vector. Based on the vulnerability’s classification as a web-based XSS flaw, the attack surface appears limited to browser-based access (OWA, Exchange Control Panel). Administrators should monitor Microsoft’s advisory for updates on affected client types.

What is still unknown

Neither the NVD entry nor CISA’s public KEV record names the threat actors exploiting this flaw, the number of compromised organizations, or the industries and regions being targeted. Those details typically surface in the days and weeks following initial disclosure as incident response teams and security vendors publish findings.

No public proof-of-concept code or sample payloads have appeared in primary government records as of late May 2026. That limits defenders’ ability to write highly specific detection rules, but it also means the technique has not yet been commoditized for mass automated scanning. History suggests that window is short. After previous Exchange vulnerabilities like ProxyLogon and ProxyShell, the gap between targeted exploitation and widespread automated attacks was measured in days.

The precise mechanism by which the XSS payload bypasses Exchange’s existing input sanitization has not been publicly described. Stored XSS in email rendering typically exploits gaps in how HTML is cleaned before display: improperly filtered attributes, event handlers, or embedded script constructs. Without detailed technical write-ups, defenders cannot yet identify the specific content patterns to block at the mail gateway level.

What defenders should do now

Patch immediately. Review Microsoft’s security advisory linked from the NVD record for CVE-2026-42897 to identify the exact cumulative or security update required for your Exchange version. Schedule emergency maintenance rather than waiting for the next routine cycle.

Restrict browser-based access. Where business requirements allow, limit OWA and Exchange Control Panel exposure to internal networks or VPN. Reducing the number of users who access Exchange through a browser directly shrinks the attack surface for this specific flaw.

Consider disabling OWA temporarily. For organizations that can tolerate the disruption, disabling Outlook on the web until patches are deployed eliminates the rendering path the exploit depends on. This is a blunt measure, but it removes the trigger mechanism entirely.

Layer browser-side defenses. Because the exploit fires in the browser, web application firewalls and reverse proxies fronting Exchange may provide partial shielding if they can sanitize or block suspicious HTML constructs in email rendering traffic. Endpoint detection and response tools on workstations can help catch follow-on activity like credential theft or unusual browser behavior, even if the initial XSS payload is not directly visible.

Increase log scrutiny. Monitor Exchange-related logs closely: authentication events, administrative actions, mailbox access via web interfaces, creation of new inbox rules, and connections from unfamiliar IP ranges. Any anomalies should be treated as potential indicators of compromise and investigated without delay.

On-premise Exchange risk keeps compounding with every zero-day cycle

Every major Exchange Server vulnerability over the past five years has renewed the same debate: is the operational risk of self-hosted Exchange still justified? CVE-2026-42897 adds another data point to that discussion. Cloud-hosted mail is not immune to vulnerabilities, but the responsibility for rapid patch deployment shifts to Microsoft, and customers benefit from more uniform security baselines and faster update cycles.

For organizations without dedicated security engineering teams capable of responding to zero-day disclosures within hours, the calculus is increasingly unfavorable. On-premise control offers flexibility, but that flexibility means nothing if a single email can compromise an authenticated session before your team has finished reading the advisory.

With vendor confirmation, federal cataloging, and verified exploitation all on the record, CVE-2026-42897 is not a vulnerability that rewards patience. Patch, restrict access, and monitor. The attackers are not waiting.

More from Morning Overview

*This article was researched with the help of AI, with human editors creating the final content.


More in Cybersecurity