{"id":2551,"date":"2026-05-20T06:49:15","date_gmt":"2026-05-20T13:49:15","guid":{"rendered":"https:\/\/www.cycognito.com\/blog\/?p=2551"},"modified":"2026-05-20T06:49:40","modified_gmt":"2026-05-20T13:49:40","slug":"emerging-threat-cve-2026-42897-microsoft-exchange-owa-cross-site-scripting-via-crafted-email","status":"publish","type":"post","link":"https:\/\/www.cycognito.com\/blog\/emerging-threat-cve-2026-42897-microsoft-exchange-owa-cross-site-scripting-via-crafted-email\/","title":{"rendered":"Emerging Threat: (CVE-2026-42897) Microsoft Exchange OWA Cross-Site Scripting via Crafted Email"},"content":{"rendered":"\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1280\" height=\"638\" src=\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/image-175-1280x638.png\" alt=\"\" class=\"wp-image-2553\" srcset=\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/image-175-1280x638.png 1280w, https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/image-175-512x255.png 512w, https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/image-175-768x383.png 768w, https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/image-175-1536x765.png 1536w, https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/image-175-2048x1021.png 2048w\" sizes=\"auto, (max-width: 1280px) 100vw, 1280px\" \/><figcaption class=\"wp-element-caption\"><em>Sample of assets impacted by Exchange OWA XSS vulnerability, identified by the CyCognito Platform<\/em><\/figcaption><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\">What is CVE-2026-42897?<\/h2>\n\n\n\n<p>CVE-2026-42897 is a cross-site scripting vulnerability in the Outlook Web Access (OWA) interface of on-premises Microsoft Exchange Server. Microsoft disclosed the flaw on May 14, 2026, two days after the May 2026 Patch Tuesday release, and confirmed it is being actively exploited in the wild. An anonymous researcher is credited with reporting the issue.<\/p>\n\n\n\n<p>The vulnerability carries a CVSS v3.1 base score of 8.1 (High) under Microsoft&#8217;s scoring. Exploitation requires user interaction but no attacker authentication. The attack proceeds by sending a specially crafted email to a target user; when the user opens that email in OWA and certain interaction conditions are met, attacker-controlled JavaScript executes in the victim&#8217;s browser session against the Exchange domain. The flaw is rooted in improper neutralization of input during web page generation, the standard underlying weakness behind reflected and stored XSS.<\/p>\n\n\n\n<p>CISA added CVE-2026-42897 to its Known Exploited Vulnerabilities (KEV) catalog on May 15, 2026, requiring Federal Civilian Executive Branch agencies to apply mitigations by May 29, 2026. Microsoft has tagged the issue with an &#8220;Exploitation Detected&#8221; assessment but has not disclosed details of the in-the-wild campaigns.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">What assets are affected by CVE-2026-42897?<\/h2>\n\n\n\n<p>The vulnerability affects on-premises Microsoft Exchange Server 2016, Exchange Server 2019, and Exchange Server Subscription Edition (SE) RTM. Exchange Online is not affected. Older unsupported builds such as Exchange Server 2010 fall outside the supported scope of Microsoft&#8217;s response but are likely vulnerable in practice, and they will not receive the automatic mitigation described below.<\/p>\n\n\n\n<p>In practice, an affected asset is an internet-facing OWA endpoint: a web mail interface published over HTTPS, typically at the network perimeter or in front of a hybrid Exchange environment. These endpoints sit at the center of corporate communication, hold session context for user mailboxes, and authenticate against domain identity. That combination makes the post-exploit blast radius considerably larger than a generic browser-context XSS would suggest. Token theft, mailbox access, and onward phishing from compromised accounts are all plausible follow-on actions.<\/p>\n\n\n\n<p>OWA endpoints are widely exposed by design. Many organizations that have otherwise migrated mail workloads to Exchange Online retain on-premises Exchange for hybrid coexistence, legacy mailbox migration, or specific compliance workloads, and those servers tend to remain internet-facing because OWA is part of how end users access mail externally.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">What does our data show about exposure patterns?<\/h2>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1185\" height=\"734\" src=\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/image-174.png\" alt=\"\" class=\"wp-image-2552\" srcset=\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/image-174.png 1185w, https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/image-174-512x317.png 512w, https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/image-174-768x476.png 768w\" sizes=\"auto, (max-width: 1185px) 100vw, 1185px\" \/><\/figure>\n\n\n\n<p>Exposure in this set is led by Industrials at 22.1% of observed Exchange assets, with Consumer Discretionary contributing 12.8%.<\/p>\n\n\n\n<p>Industrials&#8217; concentration reflects how the sector deploys email infrastructure. Aerospace, defense, transport, professional services, and large industrial conglomerates frequently run on-premises or hybrid Exchange to satisfy regulatory, data residency, or operational requirements that pure cloud mail does not always meet. Those environments often carry multiple Exchange instances across business units and geographies, accumulated over decades of acquisitions and integrations, which keeps the externally exposed surface broader than a single-tenant cloud deployment would produce.<\/p>\n\n\n\n<p>Across the cross-sector pattern, the consistent driver is incomplete migration off on-premises Exchange. Many of the observed assets sit in organizations that have moved most of their mailboxes to Microsoft 365 but retain a small on-premises footprint for hybrid identity, public folders, or migration coexistence. Those residual servers are easy to overlook in patching cadence because they no longer serve the bulk of user mail, but they remain part of the authenticated email surface and remain reachable on the same OWA path.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Are fixes available?<\/h2>\n\n\n\n<p>Partial patches available. Microsoft has not yet released a permanent code fix for CVE-2026-42897 at the time of writing. In place of a binary patch, Microsoft is shipping automatic mitigation through the Exchange Emergency Mitigation Service (EEMS), under mitigation ID M2.1.x, which applies to Exchange Server 2016, 2019, and SE. EEMS is enabled by default on supported Exchange builds released since March 2023; organizations running older builds need to update Exchange before EEMS can apply the mitigation.<\/p>\n\n\n\n<p>Customers without EEMS coverage can apply the mitigation manually through the Exchange On-Premises Mitigation Tool (EOMT) using the script Microsoft has published alongside the advisory. Verification is available through the Exchange Health Checker (<code>aka.ms\/ExchangeHealthChecker<\/code>), whose HTML report includes an EEMS check section that confirms whether the mitigation has been applied.<\/p>\n\n\n\n<p>Defenders should treat this vulnerability as actively exploited and unpatched at the binary level until a permanent fix ships. Confirm status directly with Microsoft&#8217;s advisory rather than rely on assumptions about update channels.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Are there any other recommended actions to take?<\/h2>\n\n\n\n<p>Enable Exchange Emergency Mitigation Service if it has been turned off, bring Exchange Server to a build that supports EEMS, and run EOMT manually where EEMS cannot be applied. Audit OWA logs for anomalous JavaScript execution patterns and suspicious mail flow originating from internal accounts that may indicate post-exploitation activity. Restrict OWA access from untrusted networks where the business permits it, and tighten content security policy on the OWA host as a defense-in-depth measure during this window.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">How can CyCognito help your organization?<\/h2>\n\n\n\n<p>CyCognito published an Emerging Threat Advisory for CVE-2026-42897 in the CyCognito platform and is actively researching enhanced detection capabilities for this vulnerability.<\/p>\n\n\n\n<p>To learn how CyCognito can help your organization reduce external exposure and manage emerging threats more effectively, <a href=\"https:\/\/www.cycognito.com\/demo\/\">contact us to request a demo<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>A cross-site scripting vulnerability in Microsoft Exchange Server&#8217;s Outlook Web Access lets an unauthenticated attacker execute arbitrary JavaScript in a victim&#8217;s browser session by sending a specially crafted email, and is already being exploited in the wild.<\/p>\n","protected":false},"author":39,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[3],"tags":[],"class_list":["post-2551","post","type-post","status-publish","format-standard","hentry","category-research"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.7 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Emerging Threat: (CVE-2026-42897) Microsoft Exchange OWA Cross-Site Scripting via Crafted Email | CyCognito Blog<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cycognito.com\/blog\/emerging-threat-cve-2026-42897-microsoft-exchange-owa-cross-site-scripting-via-crafted-email\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Emerging Threat: (CVE-2026-42897) Microsoft Exchange OWA Cross-Site Scripting via Crafted Email | CyCognito Blog\" \/>\n<meta property=\"og:description\" content=\"A cross-site scripting vulnerability in Microsoft Exchange Server&#039;s Outlook Web Access lets an unauthenticated attacker execute arbitrary JavaScript in a victim&#039;s browser session by sending a specially crafted email, and is already being exploited in the wild.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cycognito.com\/blog\/emerging-threat-cve-2026-42897-microsoft-exchange-owa-cross-site-scripting-via-crafted-email\/\" \/>\n<meta property=\"og:site_name\" content=\"CyCognito Blog\" \/>\n<meta property=\"article:published_time\" content=\"2026-05-20T13:49:15+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-05-20T13:49:40+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/image-175.png\" \/>\n\t<meta property=\"og:image:width\" content=\"2424\" \/>\n\t<meta property=\"og:image:height\" content=\"1208\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Igal Zeifman\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Igal Zeifman\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/emerging-threat-cve-2026-42897-microsoft-exchange-owa-cross-site-scripting-via-crafted-email\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/emerging-threat-cve-2026-42897-microsoft-exchange-owa-cross-site-scripting-via-crafted-email\/\"},\"author\":{\"name\":\"Igal Zeifman\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/#\/schema\/person\/79ab10bc35a38aef399f5bbd21d8f1b3\"},\"headline\":\"Emerging Threat: (CVE-2026-42897) Microsoft Exchange OWA Cross-Site Scripting via Crafted Email\",\"datePublished\":\"2026-05-20T13:49:15+00:00\",\"dateModified\":\"2026-05-20T13:49:40+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/emerging-threat-cve-2026-42897-microsoft-exchange-owa-cross-site-scripting-via-crafted-email\/\"},\"wordCount\":877,\"publisher\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/emerging-threat-cve-2026-42897-microsoft-exchange-owa-cross-site-scripting-via-crafted-email\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/image-175-1280x638.png\",\"articleSection\":[\"Research\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/emerging-threat-cve-2026-42897-microsoft-exchange-owa-cross-site-scripting-via-crafted-email\/\",\"url\":\"https:\/\/www.cycognito.com\/blog\/emerging-threat-cve-2026-42897-microsoft-exchange-owa-cross-site-scripting-via-crafted-email\/\",\"name\":\"Emerging Threat: (CVE-2026-42897) Microsoft Exchange OWA Cross-Site Scripting via Crafted Email | CyCognito Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/emerging-threat-cve-2026-42897-microsoft-exchange-owa-cross-site-scripting-via-crafted-email\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/emerging-threat-cve-2026-42897-microsoft-exchange-owa-cross-site-scripting-via-crafted-email\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/image-175-1280x638.png\",\"datePublished\":\"2026-05-20T13:49:15+00:00\",\"dateModified\":\"2026-05-20T13:49:40+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/emerging-threat-cve-2026-42897-microsoft-exchange-owa-cross-site-scripting-via-crafted-email\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.cycognito.com\/blog\/emerging-threat-cve-2026-42897-microsoft-exchange-owa-cross-site-scripting-via-crafted-email\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/emerging-threat-cve-2026-42897-microsoft-exchange-owa-cross-site-scripting-via-crafted-email\/#primaryimage\",\"url\":\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/image-175.png\",\"contentUrl\":\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/image-175.png\",\"width\":2424,\"height\":1208},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/emerging-threat-cve-2026-42897-microsoft-exchange-owa-cross-site-scripting-via-crafted-email\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.cycognito.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Emerging Threat: (CVE-2026-42897) Microsoft Exchange OWA Cross-Site Scripting via Crafted Email\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/#website\",\"url\":\"https:\/\/www.cycognito.com\/blog\/\",\"name\":\"Cycognito Blog\",\"description\":\"Research, Product News and Latest Updates\",\"publisher\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.cycognito.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/#organization\",\"name\":\"Cycognito\",\"url\":\"https:\/\/www.cycognito.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/logo-1720x550-1.png\",\"contentUrl\":\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/logo-1720x550-1.png\",\"width\":1720,\"height\":550,\"caption\":\"Cycognito\"},\"image\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/#\/schema\/person\/79ab10bc35a38aef399f5bbd21d8f1b3\",\"name\":\"Igal Zeifman\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/b4495bcfbe7465d573c6f7ee3e2a3cab?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/b4495bcfbe7465d573c6f7ee3e2a3cab?s=96&d=mm&r=g\",\"caption\":\"Igal Zeifman\"},\"description\":\"VP of Marketing\",\"url\":\"https:\/\/www.cycognito.com\/blog\/author\/igal-zeifman\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Emerging Threat: (CVE-2026-42897) Microsoft Exchange OWA Cross-Site Scripting via Crafted Email | CyCognito Blog","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.cycognito.com\/blog\/emerging-threat-cve-2026-42897-microsoft-exchange-owa-cross-site-scripting-via-crafted-email\/","og_locale":"en_US","og_type":"article","og_title":"Emerging Threat: (CVE-2026-42897) Microsoft Exchange OWA Cross-Site Scripting via Crafted Email | CyCognito Blog","og_description":"A cross-site scripting vulnerability in Microsoft Exchange Server's Outlook Web Access lets an unauthenticated attacker execute arbitrary JavaScript in a victim's browser session by sending a specially crafted email, and is already being exploited in the wild.","og_url":"https:\/\/www.cycognito.com\/blog\/emerging-threat-cve-2026-42897-microsoft-exchange-owa-cross-site-scripting-via-crafted-email\/","og_site_name":"CyCognito Blog","article_published_time":"2026-05-20T13:49:15+00:00","article_modified_time":"2026-05-20T13:49:40+00:00","og_image":[{"width":2424,"height":1208,"url":"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/image-175.png","type":"image\/png"}],"author":"Igal Zeifman","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Igal Zeifman","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.cycognito.com\/blog\/emerging-threat-cve-2026-42897-microsoft-exchange-owa-cross-site-scripting-via-crafted-email\/#article","isPartOf":{"@id":"https:\/\/www.cycognito.com\/blog\/emerging-threat-cve-2026-42897-microsoft-exchange-owa-cross-site-scripting-via-crafted-email\/"},"author":{"name":"Igal Zeifman","@id":"https:\/\/www.cycognito.com\/blog\/#\/schema\/person\/79ab10bc35a38aef399f5bbd21d8f1b3"},"headline":"Emerging Threat: (CVE-2026-42897) Microsoft Exchange OWA Cross-Site Scripting via Crafted Email","datePublished":"2026-05-20T13:49:15+00:00","dateModified":"2026-05-20T13:49:40+00:00","mainEntityOfPage":{"@id":"https:\/\/www.cycognito.com\/blog\/emerging-threat-cve-2026-42897-microsoft-exchange-owa-cross-site-scripting-via-crafted-email\/"},"wordCount":877,"publisher":{"@id":"https:\/\/www.cycognito.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.cycognito.com\/blog\/emerging-threat-cve-2026-42897-microsoft-exchange-owa-cross-site-scripting-via-crafted-email\/#primaryimage"},"thumbnailUrl":"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/image-175-1280x638.png","articleSection":["Research"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.cycognito.com\/blog\/emerging-threat-cve-2026-42897-microsoft-exchange-owa-cross-site-scripting-via-crafted-email\/","url":"https:\/\/www.cycognito.com\/blog\/emerging-threat-cve-2026-42897-microsoft-exchange-owa-cross-site-scripting-via-crafted-email\/","name":"Emerging Threat: (CVE-2026-42897) Microsoft Exchange OWA Cross-Site Scripting via Crafted Email | CyCognito Blog","isPartOf":{"@id":"https:\/\/www.cycognito.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.cycognito.com\/blog\/emerging-threat-cve-2026-42897-microsoft-exchange-owa-cross-site-scripting-via-crafted-email\/#primaryimage"},"image":{"@id":"https:\/\/www.cycognito.com\/blog\/emerging-threat-cve-2026-42897-microsoft-exchange-owa-cross-site-scripting-via-crafted-email\/#primaryimage"},"thumbnailUrl":"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/image-175-1280x638.png","datePublished":"2026-05-20T13:49:15+00:00","dateModified":"2026-05-20T13:49:40+00:00","breadcrumb":{"@id":"https:\/\/www.cycognito.com\/blog\/emerging-threat-cve-2026-42897-microsoft-exchange-owa-cross-site-scripting-via-crafted-email\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.cycognito.com\/blog\/emerging-threat-cve-2026-42897-microsoft-exchange-owa-cross-site-scripting-via-crafted-email\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.cycognito.com\/blog\/emerging-threat-cve-2026-42897-microsoft-exchange-owa-cross-site-scripting-via-crafted-email\/#primaryimage","url":"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/image-175.png","contentUrl":"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/image-175.png","width":2424,"height":1208},{"@type":"BreadcrumbList","@id":"https:\/\/www.cycognito.com\/blog\/emerging-threat-cve-2026-42897-microsoft-exchange-owa-cross-site-scripting-via-crafted-email\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.cycognito.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Emerging Threat: (CVE-2026-42897) Microsoft Exchange OWA Cross-Site Scripting via Crafted Email"}]},{"@type":"WebSite","@id":"https:\/\/www.cycognito.com\/blog\/#website","url":"https:\/\/www.cycognito.com\/blog\/","name":"Cycognito Blog","description":"Research, Product News and Latest Updates","publisher":{"@id":"https:\/\/www.cycognito.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.cycognito.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.cycognito.com\/blog\/#organization","name":"Cycognito","url":"https:\/\/www.cycognito.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.cycognito.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/logo-1720x550-1.png","contentUrl":"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/logo-1720x550-1.png","width":1720,"height":550,"caption":"Cycognito"},"image":{"@id":"https:\/\/www.cycognito.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.cycognito.com\/blog\/#\/schema\/person\/79ab10bc35a38aef399f5bbd21d8f1b3","name":"Igal Zeifman","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.cycognito.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/b4495bcfbe7465d573c6f7ee3e2a3cab?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/b4495bcfbe7465d573c6f7ee3e2a3cab?s=96&d=mm&r=g","caption":"Igal Zeifman"},"description":"VP of Marketing","url":"https:\/\/www.cycognito.com\/blog\/author\/igal-zeifman\/"}]}},"_links":{"self":[{"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/posts\/2551","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/users\/39"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/comments?post=2551"}],"version-history":[{"count":1,"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/posts\/2551\/revisions"}],"predecessor-version":[{"id":2554,"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/posts\/2551\/revisions\/2554"}],"wp:attachment":[{"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/media?parent=2551"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/categories?post=2551"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/tags?post=2551"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}