Skip to content
Briefings are running a touch slower this week while we rebuild the foundations.See roadmap
ES
Concept

Exchange Server CVE-2026-42897

Microsoft Exchange OWA cross-site scripting zero-day; CVSS 8.1; CISA KEV with 29 May federal deadline and no patch.

Last refreshed: 20 May 2026

Key Question

CISA gave federal agencies until 29 May to fix an Exchange bug Microsoft has not patched; what does that mean for compliance?

Timeline for Exchange Server CVE-2026-42897

#415 May

Exchange repeats the CISA deadline-before-patch trap

Cybersecurity: Threats and Defences
View full timeline →
Common Questions
What is CVE-2026-42897 in Microsoft Exchange?
CVE-2026-42897 is a cross-site scripting zero-day in Microsoft Exchange's Outlook Web Access. It is rated CVSS 8.1 and is being actively exploited against on-premises Exchange Server 2016, 2019, and Subscription Edition. CISA added it to the KEV catalogue on 15 May 2026 with a 29 May federal remediation deadline. Exchange Online is not affected.Source: CISA / Microsoft MSRC
Is there a patch for Exchange CVE-2026-42897?
As of 20 May 2026, Microsoft had not released a patch for CVE-2026-42897. The only available mitigation is the Exchange Emergency Mitigation Service URL-rewrite rule, which is applied automatically on supported on-premises deployments but breaks OWA calendar printing and Light mode.Source: Microsoft MSRC / Help Net Security
How should I protect Exchange Server from CVE-2026-42897 before a patch exists?
Microsoft's recommended mitigation is the Exchange Emergency Mitigation Service (EEMS) URL-rewrite rule, applied automatically on Exchange 2016, 2019, and SE. Additional measures include monitoring mailbox rules for unusual forwarding and rotating active OWA session tokens. Restrict OWA access to internal networks where feasible.Source: Microsoft MSRC
Why is CISA setting a 29 May deadline for an Exchange bug with no fix?
CISA's BOD 22-01 programme mandates remediation deadlines for Known Exploited Vulnerabilities regardless of whether a vendor patch exists. The 29 May deadline reflects active exploitation, not patch availability. CISA applied the same posture to PAN-OS CVE-2026-0300 on 6 May, setting a deadline before Palo Alto's patches shipped.Source: CISA

Background

Exchange Server CVE-2026-42897 is a cross-site scripting zero-day vulnerability in Microsoft Exchange's Outlook Web Access (OWA) component, rated CVSS 8.1. CISA added it to the Known Exploited Vulnerabilities catalogue on 15 May 2026 with a federal remediation deadline of 29 May 2026. Microsoft had not shipped a patch at the time of the KEV addition or as of 20 May 2026; the only available mitigation was the Exchange Emergency Mitigation Service URL-rewrite rule, which is applied automatically on supported on-premises deployments. Active exploitation has been confirmed against Exchange Server 2016, 2019, and Subscription Edition on-premises; Exchange Online is unaffected.

CVE-2026-42897 is the second instance in twelve days of CISA imposing a federal compliance obligation under BOD 22-01 without a remediation PATH. The PAN-OS CVE-2026-0300 precedent on 6 May 2026 established that CISA is willing to write KEV deadlines before vendor patches exist; CVE-2026-42897 confirms the pattern as posture rather than exception. For federal CISOs, BOD 22-01's remediation requirement conflicts with its own operational practice: the documented response to CVE-2026-42897 is the EEMS mitigation plus mailbox-rule monitoring and session-token rotation, which is not remediable under the directive's literal terms.

The EEMS URL-rewrite mitigation carries documented side effects: the OWA calendar print function breaks, inline images may not render, and OWA Light mode is broken. For organisations running on-premises Exchange, the compliance choice is a documented user-experience degradation or documented active-exploitation exposure through 29 May. Microsoft's EEMS workaround does not constitute a patch for purposes of compliance under BOD 22-01.

Source Material