• AI Search
  • Cryptocurrency
  • Earnings
  • Enterprise
  • About TechBooky
  • Submit Article
  • Advertise Here
  • Contact Us
TechBooky
  • African
  • AI
  • Metaverse
  • Gadgets
Generic selectors
Exact matches only
Search in title
Search in content
Post Type Selectors
Search in posts
Search in pages
  • African
  • AI
  • Metaverse
  • Gadgets
Generic selectors
Exact matches only
Search in title
Search in content
Post Type Selectors
Search in posts
Search in pages
TechBooky
Generic selectors
Exact matches only
Search in title
Search in content
Post Type Selectors
Search in posts
Search in pages
Home Service news

Exchange Vulnerability Turns OWA Into Script-Launching Tool

Akinola Ajibola by Akinola Ajibola
May 15, 2026
in Service news
Share on FacebookShare on Twitter

A vulnerability in on-premises Exchange Server that could cause victims’ browsers to execute unexpected scripts has been discovered by Microsoft.

The vulnerability, known as CVE-2026-42897, which has been tracked, impacts Outlook Web Access (OWA) and can be activated via a specifically constructed email that is opened in OWA, provided that “certain interaction conditions are met.” Attackers can execute JavaScript arbitrarily within the browser context of the mark as a reward.

The vulnerability in Outlook Web Access (OWA) allows unauthorized malicious payloads to execute in user mailboxes.

Administrators will be alarmed by the advisory’s description of the problem as a spoofing vulnerability resulting from cross-site scripting, which seems to be being exploited. The bug received an 8.1 CVSS score. 

Regardless of their degree or level of upgrade, Exchange Server 2016, 2019, and the most recent version, Exchange Server Subscription Edition (SE), are all impacted. The Exchange Emergency Mitigation (EM) Service has made a mitigation available.

Microsoft had cautioned that the mitigation might cause other issues, such as the OWA Print Calendar feature not working (alternatively, Microsoft advises the use of a screenshot or the Outlook desktop client instead) and inline graphics ceasing to operate in the recipient’s OWA reading pane (alternatively, Microsoft advises the use of attachments).

Lastly, OWA Light may not function correctly. And the affected users should think about upgrading, as Microsoft deprecated this in the 2024 edition.

In a situation(s) when clients are not utilizing the EM service, the mitigation can also be manually implemented. These might be in air-gapped or disconnected environments, which are precisely the kinds of settings where on-premises Exchange tends to exist.

Although only the Exchange SE version will be made accessible to the general public, Microsoft is working on a complete security update. It will only be available to Exchange 2016 and 2019 when users are signed up for Period 2 of the Exchange Server Extended Security Updates (ESU) program. This month marked the start of the second Exchange Server ESU period, and Microsoft issued a strong warning that there would be no further extensions to users. Exchange Online is not impacted by the issue.

Microsoft has not disclosed any information regarding the exploit’s functionality or the extent to which it is being used. 

While Microsoft prepares a permanent security update, administrators should verify that automated mitigations are active via the Exchange Emergency Mitigation Service using the Health Checker script or deploy the standalone EOMT tool on offline networks, but note that these measures may temporarily disrupt inline image rendering and calendar printing in OWA.

Related Posts:

  • 1_8_VsolmlGbZ-OhZN0wEgrw
    Over 46,000 Grafana Instances Vulnerable to Account Takeover
  • 020tYFWBL4Yz8jIIFUdKDR1-22
    A Fix to Microsoft Windows Defender And Security Flaws
  • was-ist-cpanel
    Hackers Are Exploiting Critical cPanel Bug, Putting…
  • Microsoft Teams
    Microsoft Teams Vulnerability Exposes User Systems
  • Cloudflare-AI_Bot-Blocking
    Cloudflare Blames React2Shell Protections for Outage
  • Google-Chrome-headpic
    Google Patches Fourth Chrome Zero-Day of 2026 as…
  • shutterstock_chatgpt
    Researchers Warn ChatGPT Crawler May Cause DDoS…
  • Exchange_1500x1500 (1)
    Microsoft to Retire Exchange Web Services in 2027

Discover more from TechBooky

Subscribe to get the latest posts sent to your email.

Tags: ExchangeExchange Servermicrosoftvulnerability
Akinola Ajibola

Akinola Ajibola

BROWSE BY CATEGORIES

Receive top tech news directly in your inbox

subscription from
Loading

Freshly Squeezed

  • Exchange Vulnerability Turns OWA Into Script-Launching Tool May 15, 2026
  • OpenAI Introduces ChatGPT For Personal Finance With Bank Account Integration May 15, 2026
  • Outage On Google’s Nest App May 15, 2026
  • Microsoft Introduces Automatic Rollbacks For Faulty Windows Drivers May 15, 2026
  • Opay & Moniepoint Collaborate With Vitel On Airtime & Data Services May 15, 2026
  • OpenAI Extends Codex Integration To ChatGPT Apps On iOS & Android For Users May 15, 2026
  • Microsoft Initiates Claude Code Licenses Termination May 15, 2026
  • NCC Tackles Rising Complaints As TELCOs Commits N2.5tn Into Network Upgrades May 14, 2026
  • KongTuke Hackers Exploits Microsoft Teams To Breach Companies May 14, 2026
  • OpenAI Confirms Hack Linked to TanStack Attack May 14, 2026
  • Apple Sides With Google in EU Fight Over Opening Android to AI Rivals May 14, 2026
  • OpenAI and Apple Partnership Frays as ChatGPT iPhone Deal Faces Legal Threat May 14, 2026

Browse Archives

May 2026
MTWTFSS
 123
45678910
11121314151617
18192021222324
25262728293031
« Apr    

Quick Links

  • About TechBooky
  • Advertise Here
  • Contact us
  • Submit Article
  • Privacy Policy
Generic selectors
Exact matches only
Search in title
Search in content
Post Type Selectors
Search in posts
Search in pages
  • African
  • Artificial Intelligence
  • Gadgets
  • Metaverse
  • Tips
  • AI Search
  • About TechBooky
  • Advertise Here
  • Submit Article
  • Contact us

© 2025 Designed By TechBooky Elite

Discover more from TechBooky

Subscribe now to keep reading and get access to the full archive.

Continue reading

We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.