Lyrie
Actively Exploited
CVSS 8.1ACTIVELY EXPLOITED4 sources verified·1 min read
By Lyrie Threat Intelligence·5/15/2026

HIGH: CVE-2026-42897 actively exploited — microsoft exchange server

CVE: CVE-2026-42897

CVSS: 8.1 (3.1) — CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N

Severity: HIGH

Status: ✅ Confirmed exploited in the wild (CISA KEV)

Affected

  • microsoft exchange server

Summary

Improper neutralization of input during web page generation ('cross-site scripting') in Microsoft Exchange Server allows an unauthorized attacker to perform spoofing over a network.

Verified Sources

References

  • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-42897

_Validated by the Lyrie Threat Intelligence Pipeline — 3 independent sources confirmed before publication. No speculation._

Lyrie Verdict

Lyrie's autonomous detection layer catches active exploitation primitives at machine speed — closing the gap between disclosure and weaponization that traditional defense simply can't cover.

Validated sources

  1. [1]NVD
  2. [2]GitHub Advisory
  3. [3]MITRE
  4. [4]CISA KEV