Skip to main content

Command Palette

Search for a command to run...

New Zero-Day on Microsoft Exchange: Just one email can steal an entire OWA login session.

Updated
9 min read
New Zero-Day on Microsoft Exchange: Just one email can steal an entire OWA login session.

Risk summary

Recently, a particularly severe vulnerability was discovered, causing significant concern within the security community. Just a single carefully crafted email is enough to execute malicious JavaScript directly in the browser of Microsoft Exchange On-Prem users. Alarmingly, this vulnerability was exploited in the wild before many organizations realized they were at risk. However, the most notable issue isn't the potential to hijack an Outlook Web Access (OWA) session. The real problem is that even Microsoft's official security check tool is "overlooking" the system's protection status. Health Checker might report that the server is secure while the mitigation isn't functioning properly—creating an extremely dangerous false sense of security for administrators.

Background and history of the attack

Microsoft Exchange On-Premises has long been a key target for APT and ransomware operators because it is considered a central enterprise email system, often exposed to the Internet via OWA/ECP, and contains credentials and sensitive data. This is not the first time Microsoft Exchange On-Premises has been actively exploited; in the past, there have been numerous high-risk campaigns recorded.

Campaign

Year recorded

CVE

Affected version

Type of vulnerability

ProxyLogon

2021

CVE-2021-26855, CVE-2021-26857, CVE-2021-26858, CVE-2021-27065

Microsoft Exchange Server 2013–2019

Remote code execution (RCE) via unauthenticated access

ProxyShell

2021

CVE-2021-34473, CVE-2021-34523, CVE-2021-31207

Microsoft Exchange Server (on-premises)

Remote code execution (RCE) via unauthenticated access

OWASSRF

2022

CVE-2022-41040 and CVE-2022-41082

Microsoft Exchange Server 2013, 2016, 2019

Server-Side Request Forgery (SSRF) and Remote Code Execution (RCE)

CVE-2026-42897 continues to highlight the current cybersecurity reality that Exchange On-Premises remains a significant attack surface. The OWA browser context is an attractive target, and email-based exploitation is still effective despite the presence of many modern defense layers. Unlike ProxyLogon/ProxyShell, which focus on server-side RCE, CVE-2026-42897 exploits client-side browser execution, session hijacking, identity abuse, and browser trust exploitation.

Information vulnerability

Attribute Value
CVE CVE-2026-42897
Severity High
CVSS 8.1
CWE CWE-79 – Cross-Site Scripting
Affected Component Outlook Web Access (OWA)
Affected Products Exchange Server 2016 / 2019 / SE
Attack Vector Network
User Interaction Required
Exploitation Confirmed In-The-Wild

Event timeline

Event timeline Event
14/05/2026 Microsoft announces CVE-2026-42897
14/05/2026 Confirmed active exploitation
15/05/2026 The Hacker News and several security firms issued warnings.
15–17/05/2026 Microsoft released a temporary mitigation through EEMS.
Hiện tại Currently, there is no complete permanent security patch available.

Technical mechanism

Exploitation conditions

To successfully carry out the campaign, the attacker first sends a crafted email, then the user opens the email using OWA, and the JavaScript payload executes in the browser context. The attacker's payload can: read the DOM, send requests on behalf of the user, steal tokens, and perform spoofing actions.

To understand why CVE-2026-42897 is dangerous even though it is not a traditional Remote Code Execution (RCE) vulnerability, we need to look at how Microsoft Exchange On-Premise handles email through Outlook Web Access (OWA).

In the typical operation model, users access OWA via a web browser. The request goes through IIS and the Exchange Frontend before connecting to the Mailbox Service to retrieve email content. Then, the OWA Rendering Engine converts the email into HTML content and returns it for the user's browser to display.

The issue with CVE-2026-42897 lies precisely in this content rendering step. When an email containing HTML is sent to the Exchange system, OWA parses the MIME content, reconstructs the HTML content, and renders it directly in the browser. By design, HTML email is considered valid "rich content" to support a modern webmail experience. However, the input data sanitization process did not completely remove dangerous elements controlled by the attacker. This creates a Stored XSS within the context of OWA.

In other words, the attacker doesn't need to exploit the operating system or execute code on the Exchange server. Instead, they just need to send a crafted email containing specially designed HTML/JavaScript payload. When the victim opens the email using OWA, the browser will render this content as a legitimate part of the Exchange webpage, and the malicious JavaScript will execute directly within the user's session.

This means the malicious script will run under the same origin as OWA, for example:

When the browser trusts this origin, JavaScript can perform a range of dangerous actions such as reading the DOM, sending requests on behalf of the user, manipulating the mailbox, creating mailbox rules, or stealing session/authentication tokens. This is why CVE-2026-42897, although "just" an XSS, has an impact very close to a complete account compromise.

Detailed technique

To successfully exploit this vulnerability, the attacker needs to go through four different stages, from reconnaissance to extracting critical data, with each stage serving as a stepping stone for subsequent attacks.

Stage 1 – The attacker sends a crafted email

The first step of the attack chain is extremely simple. The attacker just needs to send an email containing a specially crafted HTML or JavaScript payload to an internal user.

Stage 2 – Exchange processes the email

When the email reaches the mailbox, Exchange performs several steps: saving the email to the database, parsing the MIME structure, converting the email into web content, and rendering it in OWA. As mentioned, this process is the root cause of the vulnerability. OWA believes the HTML email is "valid rich content," so it tries to retain as much formatting as possible to give users an experience similar to Outlook desktop. However, during the HTML rebuild, some attacker-controlled content is not completely removed. Simply put, when the attacker sends "spoofed HTML," OWA inadvertently turns it into "valid HTML," and the browser executes it as trusted content. This technique is known as Stored XSS.

Stage 3 – The user opens the email using OWA

As soon as the victim logs into https://mail.company.com/owa/ and opens the malicious email, the browser will render the email content directly within the OWA website. The crucial point here is that the browser trusts mail.company.com since it is the legitimate company website. Because the JavaScript is executed under the same origin as OWA, the attacker can read the mailbox content, send authenticated requests, access the current session, and manipulate the mailbox on behalf of the user.

Stage 4 – JavaScript begins to operate

Once the payload runs successfully, the attacker can perform many dangerous actions right within the victim's browser session. For example, they can: read emails, send internal emails, create mailbox forwarding rules, steal authentication tokens, automatically conduct internal phishing, or even more dangerously, download additional payloads from an external server. The frightening aspect is that all these actions occur under the legitimate session of the real user. From the system's perspective: Exchange sees the request as valid, the browser sees the JavaScript as valid, EDR doesn't detect a malware process, and SOC struggles to immediately identify any anomalies.

MITRE ATT&CK Mapping

Tactic Technique Mô tả
Initial Access T1566.001 Spearphishing Attachment/Email
Execution T1059.007 JavaScript Execution
Credential Access T1539 Steal Web Session Cookie
Collection T1114 Email Collection
Persistence T1137 Office Application Startup/Rules
Defense Evasion T1036 Masquerading/Spoofing
Lateral Movement T1021 Remote Services via hijacked account

Assessment

Although the CVSS score of 8.1 accurately reflects the severity of the risk of widespread mailbox takeover, the biggest challenge in the CVE-2026-42897 event lies more in security operations (SecOps) than in the exploitation technique itself. In Vietnam, many organizations in the financial sector, government agencies, and large enterprises still operate Microsoft Exchange On-Premise systems as a critical infrastructure. In reality, many administrative teams rely almost entirely on the results from Microsoft's Health Checker script to assess patch status and report directly to leadership.

When this tool shows a "false negative"—indicating the system is unprotected even though mitigation has been applied—the consequences extend beyond technical issues. It can create significant operational pressure on the SOC and infrastructure team, leading to wasted time on repeated verification and investigation, unnecessary internal alerts, confusion during response efforts, and, more seriously, prompting engineers to make uncontrolled configuration changes or reapply mitigation, inadvertently increasing the risk of system discrepancies or service disruptions.

Verify the exact status of mitigation

  • Do not rely solely on results from the Health Checker or any single tool to conclude that the system is secure.

  • Verify mitigation at both the configuration and actual behavior levels.

  • Save configuration snapshots before and after applying mitigation.

  • Standardize the verification checklist for the SOC and operations team.

Check the status of the Exchange Emergency Mitigation Service (EEMS)

Ensure:

  • EEMS is enabled.

  • The server can connect to the Microsoft Office Config Service.

  • The latest mitigation has been successfully downloaded and applied.

Check:

Get-ExchangeServer | Format-List MitigationsEnabled

Check applied mitigation:

Get-Mitigations

Monitor related Event IDs: 1005, 1006, 1008

Review all Exchange Internet-facing

  • Limit OWA access using VPN or Conditional Access,

  • Apply Geo-IP filtering,

  • Allow only whitelisted IPs for the admin portal,

  • Separate administrative access from public access.

Enhance monitoring for OWA

  • Track anomalies in IIS Logs

  • Monitor mailbox activity

  • Track unusual session/token activity

Strengthen user-side protection

  • Enforce MFA for OWA

  • Limit browser risk

  • Enhance user awareness

    • Do not open suspicious HTML emails,

    • Do not trust unusual internal emails,

Check for unusual outbound email

Focus on:

  • Sudden increase in sending volume,

  • Mass internal sending,

  • Sending to unknown domains.

Refer

On-Prem Microsoft Exchange Server CVE-2026-42897 Exploited via Crafted Email

atiilla/CVE-2026-42897: CVE-2026-42897 - Exchange Health Checker blind spot: outbound IIS URL Rewrite rules silently ignored, making EOMT mitigations invisible in diagnostic reports.

Addressing Exchange Server May 2026 vulnerability CVE-2026-42897 | Microsoft Community Hub

More from this blog

F

FPT IS Security

790 posts

Dedicated to providing insightful articles on cybersecurity threat intelligence, aimed at empowering individuals and organizations to navigate the digital landscape safely.