Summary
Microsoft Exchange Server Outlook Web Access has a cross-site scripting issue in web page generation that can be triggered by a specially crafted email. When an authenticated user opens the message in OWA and the required interaction conditions are met, attacker-controlled JavaScript can run in the browser context. Microsoft says the issue affects on-premises Exchange Server 2016, 2019, and Subscription Edition and is being actively exploited.
Why Planned Fix?
3/6Exploitation Details
Execute attacker-controlled JavaScript in the victim's OWA browser session and impersonate the user.
Account TakeoverAffected Software
| Product | Affected Versions |
|---|---|
| Microsoft Exchange Server | 2016, 2019, and Subscription Edition (on-premises) |
Microsoft Exchange Server is an on-premises email, calendaring, and collaboration platform that provides mailbox hosting, transport, and web access through Outlook Web Access.
Affected ComponentOutlook Web Access (OWA) email rendering and HTML response generation in the web mail interface.
Outlook Web Access (OWA) email rendering and HTML response generation in the web mail interface.
Affected Endpoints(1)/owa
Allow Microsoft Exchange Emergency Mitigation Service to apply mitigation M2 (URL Rewrite) and keep outbound access to officeclient.microsoft.com:443 so the mitigation can be fetched and refreshed.
Allow Microsoft Exchange Emergency Mitigation Service to apply mitigation M2 (URL Rewrite) and keep outbound access to officeclient.microsoft.com:443 so the mitigation can be fetched and refreshed.
Not available
Not available
Probability of exploitation in the next 30 days
Worse than 94% of all CVEs
No known threat actors
No detection rules available
NVD Data
Description Summary
CVSS Base Score
CVSS Vector (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N)
Affected Software (CPE) (40)
- •cpe:2.3:a:microsoft:exchange_server:-:*:*:*:subscription:*:*:*
- •cpe:2.3:a:microsoft:exchange_server:2016:-:*:*:*:*:*:*
- •cpe:2.3:a:microsoft:exchange_server:2016:cumulative_update_1:*:*:*:*:*:*
- •cpe:2.3:a:microsoft:exchange_server:2016:cumulative_update_10:*:*:*:*:*:*
- •cpe:2.3:a:microsoft:exchange_server:2016:cumulative_update_11:*:*:*:*:*:*
- •cpe:2.3:a:microsoft:exchange_server:2016:cumulative_update_12:*:*:*:*:*:*
- •cpe:2.3:a:microsoft:exchange_server:2016:cumulative_update_13:*:*:*:*:*:*
- •cpe:2.3:a:microsoft:exchange_server:2016:cumulative_update_14:*:*:*:*:*:*
- •cpe:2.3:a:microsoft:exchange_server:2016:cumulative_update_15:*:*:*:*:*:*
- •cpe:2.3:a:microsoft:exchange_server:2016:cumulative_update_16:*:*:*:*:*:*
- •cpe:2.3:a:microsoft:exchange_server:2016:cumulative_update_17:*:*:*:*:*:*
- •cpe:2.3:a:microsoft:exchange_server:2016:cumulative_update_18:*:*:*:*:*:*
- •cpe:2.3:a:microsoft:exchange_server:2016:cumulative_update_19:*:*:*:*:*:*
- •cpe:2.3:a:microsoft:exchange_server:2016:cumulative_update_2:*:*:*:*:*:*
- •cpe:2.3:a:microsoft:exchange_server:2016:cumulative_update_20:*:*:*:*:*:*
- •cpe:2.3:a:microsoft:exchange_server:2016:cumulative_update_21:*:*:*:*:*:*
- •cpe:2.3:a:microsoft:exchange_server:2016:cumulative_update_22:*:*:*:*:*:*
- •cpe:2.3:a:microsoft:exchange_server:2016:cumulative_update_23:*:*:*:*:*:*
- •cpe:2.3:a:microsoft:exchange_server:2016:cumulative_update_3:*:*:*:*:*:*
- •cpe:2.3:a:microsoft:exchange_server:2016:cumulative_update_4:*:*:*:*:*:*
- •cpe:2.3:a:microsoft:exchange_server:2016:cumulative_update_5:*:*:*:*:*:*
- •cpe:2.3:a:microsoft:exchange_server:2016:cumulative_update_6:*:*:*:*:*:*
- •cpe:2.3:a:microsoft:exchange_server:2016:cumulative_update_7:*:*:*:*:*:*
- •cpe:2.3:a:microsoft:exchange_server:2016:cumulative_update_8:*:*:*:*:*:*
- •cpe:2.3:a:microsoft:exchange_server:2016:cumulative_update_9:*:*:*:*:*:*
- •cpe:2.3:a:microsoft:exchange_server:2019:-:*:*:*:*:*:*
- •cpe:2.3:a:microsoft:exchange_server:2019:cumulative_update_1:*:*:*:*:*:*
- •cpe:2.3:a:microsoft:exchange_server:2019:cumulative_update_10:*:*:*:*:*:*
- •cpe:2.3:a:microsoft:exchange_server:2019:cumulative_update_11:*:*:*:*:*:*
- •cpe:2.3:a:microsoft:exchange_server:2019:cumulative_update_12:*:*:*:*:*:*
- •cpe:2.3:a:microsoft:exchange_server:2019:cumulative_update_13:*:*:*:*:*:*
- •cpe:2.3:a:microsoft:exchange_server:2019:cumulative_update_14:*:*:*:*:*:*
- •cpe:2.3:a:microsoft:exchange_server:2019:cumulative_update_2:*:*:*:*:*:*
- •cpe:2.3:a:microsoft:exchange_server:2019:cumulative_update_3:*:*:*:*:*:*
- •cpe:2.3:a:microsoft:exchange_server:2019:cumulative_update_4:*:*:*:*:*:*
- •cpe:2.3:a:microsoft:exchange_server:2019:cumulative_update_5:*:*:*:*:*:*
- •cpe:2.3:a:microsoft:exchange_server:2019:cumulative_update_6:*:*:*:*:*:*
- •cpe:2.3:a:microsoft:exchange_server:2019:cumulative_update_7:*:*:*:*:*:*
- •cpe:2.3:a:microsoft:exchange_server:2019:cumulative_update_8:*:*:*:*:*:*
- •cpe:2.3:a:microsoft:exchange_server:2019:cumulative_update_9:*:*:*:*:*:*
Sources
| Source | Article |
|---|---|
| nvd.nist.gov | CVE-2026-42897 Detail |
| techcommunity.microsoft.com | Addressing Exchange Server May 2026 vulnerability CVE-2026-42897 |
| learn.microsoft.com | Exchange Emergency Mitigation Service |
| tenable.com | CVE-2026-42897 |
| cisa.gov | Known Exploited Vulnerabilities Catalog |
Priority History
Initial analysis