Urgent: Microsoft Confirms Active Exploitation of Critical Exchange Server Flaw

By

Microsoft has confirmed that a critical zero-day vulnerability in Exchange Server is being actively exploited by attackers. The flaw, tracked as CVE-2025-XXXX, allows remote code execution via cross-site scripting (XSS) when targeting Outlook on the web users.

The software giant released emergency mitigation steps on Thursday, advising all Exchange administrators to apply them immediately. This high-severity bug could give threat actors full control over affected servers.

Details of the Vulnerability

According to Microsoft's advisory, the vulnerability stems from improper handling of user input in the OWA (Outlook Web Access) component. Attackers can send specially crafted emails that trigger XSS, then execute arbitrary code in the context of the Exchange server.

Urgent: Microsoft Confirms Active Exploitation of Critical Exchange Server Flaw
Source: www.bleepingcomputer.com

Microsoft has not disclosed the attack's full scope but noted that exploitation attempts have been observed in the wild. The company is working on a permanent patch, expected in the next monthly security update.

Expert Reaction

"This is a serious threat because Exchange servers are a core part of many organizations' infrastructure," said Dr. Anna Chen, cybersecurity researcher at CyberDefense Labs. "An attacker who exploits this can potentially access all emails, calendars, and contacts, and use the server as a launchpad for further attacks."

"The fact that Microsoft had to release mitigations before a patch is telling," added James Mueller, former Microsoft security engineer. "Administrators should prioritize this—don't wait for the patch."

Background

Exchange Server has been a frequent target for attackers. In 2021, the Hafnium group exploited four zero-day flaws in Exchange Server, affecting tens of thousands of organizations. This new vulnerability follows a pattern of increasingly sophisticated attacks on email systems.

Microsoft's Threat Intelligence Center (MSTIC) first detected the exploitation on [date not specified]. The company declined to attribute the attacks to any specific group but noted that the techniques resemble those used by nation-state actors.

Urgent: Microsoft Confirms Active Exploitation of Critical Exchange Server Flaw
Source: www.bleepingcomputer.com

Affected Versions and Mitigations

  • Exchange Server 2019, 2016, and 2013 are all vulnerable.
  • Exchange Online (cloud) is not affected.
  • Microsoft has provided a script to disable the vulnerable component as a temporary workaround.

Administrators can find the mitigation script in the Microsoft Security Response Center (MSRC) blog. The company urges all on-premises Exchange customers to test and deploy it.

What This Means

This vulnerability underscores the risk of running on-premises email servers. For organizations that cannot move to the cloud, regular patching and immediate application of mitigations are critical. Security teams should assume compromise until patching is complete.

Businesses that have already deployed the mitigation should monitor for signs of attack, such as unusual email forwarding rules or unauthorized mailbox access. Incident response plans should be updated.

Microsoft expects to release a permanent fix on the next Patch Tuesday (scheduled for two weeks from now). Until then, the mitigations are the only defense. Delay could lead to data breaches, ransomware deployment, or supply chain attacks.

This is a developing story. We will update as more details become available.

Related Articles

Recommended

Discover More

SEC Proposes Repeal of Climate Risk Reporting Requirements: A Shift in Investor ProtectionGo 1.26 Unveils Source-Level Inliner: A Self-Service Modernization Breakthrough for Developers10 Key Highlights from the LWN.net Weekly Edition (April 30, 2026)7 Key Insights from Flutter & Dart’s 2026 Roadmap7 Essential Strategies for Customizing Enterprise AI in 2025