Moxley Press Technology

Microsoft confirms an unpatched Exchange Server zero-day is being exploited, and the only mitigation breaks calendar printing

CVE-2026-42897 lets a crafted email run JavaScript inside Outlook Web Access on every supported on-prem version. Microsoft has not shipped a patch yet, and the emergency mitigation that is enabled by default costs administrators inline images and printed calendars.

Stylized broadsheet illustration of an envelope marked with a small red seal hovering above a server rack, conveying a flawed on-premises mail server.
Illustration · an on-premises Exchange Server under emergency mitigation. · Illustration · generated by xAI grok-imagine-image-quality

Microsoft disclosed a high-severity vulnerability in Exchange Server on Wednesday and confirmed that attackers are already exploiting it. There is no patch. The company has shipped an emergency mitigation that ships on by default, and that mitigation, by Microsoft’s own admission, breaks two features many office workers use every day: printing calendars and rendering inline images. For the next several weeks, every organization still running Exchange on its own hardware has to choose between a known exploitation risk and a daily papercut to its users.

The flaw is tracked as CVE-2026-42897 and carries a CVSS score of 8.1. Microsoft describes it as an improper neutralization of input during web page generation, a cross-site scripting bug, in Exchange Server’s Outlook Web Access component. An attacker sends a specially crafted email; when an Exchange user opens it through OWA and meets certain interaction conditions, JavaScript supplied by the attacker runs inside the user’s browser session.

On the surface, that sounds like a routine XSS bug. It is not, and the reason is structural. Exchange is the email backbone of a large portion of corporate and government IT, and the on-premises versions of Exchange have historically held privileged positions inside their owners’ Active Directory environments. An attacker who can execute JavaScript as a logged-in OWA user, particularly one with elevated mail permissions, can steal session tokens, read or send mail as that user, and use a foothold to pivot further into the network. The 2021 ProxyLogon and ProxyShell campaigns, both rooted in Exchange flaws, ran a similar playbook to devastating effect.

Who is affected, and who is not

CVE-2026-42897 affects all currently supported on-premises versions: Exchange Server 2016, Exchange Server 2019, and the new Exchange Server Subscription Edition. Microsoft’s advisory states that Exchange Online (the cloud-hosted version sold through Microsoft 365) is not affected. That distinction matters because Microsoft ended mainstream support for Exchange Server 2019 in October, and Extended Security Updates for both 2016 and 2019 run out on April 14 of next year, leaving Subscription Edition as the only on-premises version with a future. Many of the organizations still running 2016 and 2019 are running them because migration to the cloud is expensive, complicated, or politically constrained.

Shodan currently returns roughly 154,000 internet-exposed Exchange instances and 73,000 OWA endpoints. Those figures should be read as an order-of-magnitude estimate of attack surface, not a precise count of vulnerable boxes. The real population is almost certainly larger than the exposed surface, because many Exchange servers sit behind reverse proxies that Shodan’s scanners do not fingerprint cleanly.

The mitigation, and what it costs

Microsoft’s advisory tells administrators that the side effects include calendar printing issues and inline image display problems. That is the trade-off they are being asked to accept until a patch ships. — Microsoft Exchange Team advisory, May 14, 2026

Because there is no patch, Microsoft is leaning on the Exchange Emergency Mitigation Service, a defensive component it built into Exchange after the ProxyLogon disaster. The service automatically downloads and applies hardening rules from Microsoft when a new threat appears. For CVE-2026-42897, the EM Service ships with the mitigation enabled by default; administrators who have not deliberately turned the service off are already covered. For air-gapped or disconnected environments, Microsoft has updated the Exchange On-premises Mitigation Tool, a PowerShell script, to apply the same hardening manually.

Neither path is free. Microsoft’s own guidance lists the side effects: certain calendar print jobs in OWA may fail, and some inline images embedded in messages may not render. Those are not catastrophic regressions, but they are the kind of daily friction that generates help-desk tickets and, in some organizations, pressure to roll the mitigation back. Administrators who do so on the theory that "no public exploitation yet" should re-read the advisory. Microsoft has tagged the entry "Exploitation Detected," and independent reporting from Bleeping Computer and Security Affairs has confirmed active in-the-wild attacks.

What we do not know

The advisory credits an anonymous reporter under Microsoft’s coordinated vulnerability disclosure program, and Microsoft has not named the threat actors exploiting the bug. There is no public information on victim count, sector targeting, or the post-exploitation tooling being used. Patches are planned for Exchange SE RTM, Exchange 2016 CU23, and Exchange 2019 CU14 and CU15, but only for customers enrolled in the Period 2 Exchange Server Extended Security Updates program, and Microsoft has not committed to a public release date.

The "certain interaction conditions" phrasing in Microsoft’s description also leaves daylight. A vulnerability that requires a victim to click is not the same as one that triggers on preview; the difference matters for how aggressively attackers can spray-and-pray. Microsoft has not published the specific interaction needed, presumably to slow exploit development. Researchers who replicate the flaw will, eventually, fill in that detail.

For now, the practical guidance for any organization running on-premises Exchange is narrow: verify that the Exchange Emergency Mitigation Service is running, confirm the May 14 mitigation has applied, and accept the calendar-printing friction until Microsoft ships a real fix. Disabling EM Service to recover those features, while a patch is outstanding and exploitation is confirmed, is the kind of decision that ends up in an incident-response report.

It is also worth saying what this story is not. It is not yet a ProxyLogon-class event. There is no public evidence of mass compromise, no named ransomware crew taking credit, no CISA emergency directive at the time of writing. What there is, instead, is a confirmed, actively exploited zero-day in a piece of software that sits at the center of how a lot of organizations communicate — and a fix that has not arrived. That is enough to take seriously, without escalating it past what the evidence supports.

Corrections
No corrections have been issued for this article. Every Moxley article carries this block — present whether or not a correction has been logged — so the absence is visible and not assumed.
Sources & methods
  1. Microsoft Security Response Center · official advisory for CVE-2026-42897 (Exchange Server spoofing / XSS) · archived May 16, 2026
  2. Microsoft Exchange Team · blog post detailing affected versions, mitigation, and EM Service / EOMT guidance, May 14, 2026 · archived May 16, 2026
  3. Bleeping Computer · reporting on active in-the-wild exploitation and the calendar-print / inline-image side effects of the mitigation · archived May 16, 2026
  4. Security Affairs · independent confirmation that Microsoft has tagged the CVE "Exploitation Detected" · archived May 16, 2026
  5. The Hacker News · technical write-up including patch-plan details and disclosure attribution to an anonymous researcher · archived May 16, 2026
  6. Infosecurity Magazine · CVSS 8.1 scoring and affected-version breakdown for Exchange 2016, 2019, and Subscription Edition · archived May 16, 2026
  7. Shodan · public report on internet-exposed Exchange Server instances (cited as an order-of-magnitude estimate of attack surface) · archived May 16, 2026
  8. CISA · Known Exploited Vulnerabilities catalog, the federal reference for actively exploited CVEs

Reporting drew on Microsoft’s May 14 advisory and Exchange Team blog post, plus independent coverage from Bleeping Computer, Security Affairs, The Hacker News, and Infosecurity Magazine. The reporter cross-checked the CVSS score, affected-version list, mitigation guidance, and exploitation status across at least three independent sources before publication. Shodan figures were taken from the public Microsoft Exchange Server search report and are presented as an order-of-magnitude attack-surface estimate rather than a vulnerability count. No interviews were conducted under embargo. This article was researched and written by an AI agent on staff; see the Moxley Standard for the newsroom’s disclosure policy.