{"id":117,"date":"2026-05-15T14:02:55","date_gmt":"2026-05-15T14:02:55","guid":{"rendered":"https:\/\/blog.cydhaal.com\/index.php\/2026\/05\/15\/exchange-server-owa-spoofing-flaw-actively-exploited\/"},"modified":"2026-05-15T14:57:08","modified_gmt":"2026-05-15T14:57:08","slug":"exchange-server-owa-spoofing-flaw-actively-exploited","status":"publish","type":"post","link":"https:\/\/blog.cydhaal.com\/index.php\/2026\/05\/15\/exchange-server-owa-spoofing-flaw-actively-exploited\/","title":{"rendered":"Exchange Server OWA Spoofing Flaw Actively Exploited"},"content":{"rendered":"<p>A critical vulnerability in Microsoft Exchange Server has emerged as a significant threat to enterprise email security worldwide. The flaw, tracked as CVE-2026-42897, enables attackers to conduct sophisticated spoofing attacks through Outlook Web Access, putting countless organizations at risk of credential theft and business email compromise. Security researchers have confirmed active exploitation in the wild, making immediate action essential for all Exchange Server administrators.<\/p>\n<h2>What Happened<\/h2>\n<p>Microsoft has disclosed a spoofing vulnerability affecting multiple versions of Exchange Server that allows threat actors to manipulate how emails appear within Outlook Web Access. The vulnerability exists in how Exchange Server processes certain email headers and metadata, enabling attackers to forge sender information and create highly convincing phishing messages that bypass standard security controls. Reports from multiple cybersecurity firms indicate that advanced persistent threat groups have already begun weaponizing this flaw in targeted campaigns against government agencies, financial institutions, and healthcare organizations. The attacks involve specially crafted emails that exploit the vulnerability to display false sender addresses, making malicious messages appear as if they originate from trusted internal sources or legitimate external partners. Unlike traditional email spoofing techniques that can be detected through SPF and DKIM validation, this vulnerability operates at the application layer where Exchange Server renders messages in OWA, effectively circumventing established email authentication protocols.<\/p>\n<h2>How It Works<\/h2>\n<p>The vulnerability exploits a weakness in how Exchange Server interprets and displays email header information within the Outlook Web Access interface. Attackers construct emails with carefully manipulated MIME headers and content-type declarations that cause Exchange Server to misrepresent the true sender address when rendering messages in OWA. When a user accesses their mailbox through the web interface, the crafted email appears with a spoofed sender address that matches trusted contacts or internal personnel. The technical mechanism involves abusing the way Exchange Server prioritizes different email header fields during the display process. By inserting conflicting sender information in specific header combinations, attackers can control what users see in their inbox while the actual source remains hidden. This creates a powerful social engineering vector because users naturally trust what appears in their official company email interface. The spoofed messages typically contain links to credential harvesting pages or malicious attachments designed to establish initial access to corporate networks. Because the spoofing occurs at the server rendering level rather than in transit, traditional email gateway security solutions may fail to detect the manipulation until messages have already reached user mailboxes.<\/p>\n<h2>What You Should Do<\/h2>\n<p>Organizations running Exchange Server must prioritize applying the latest security updates from Microsoft immediately. The patches address the underlying parsing vulnerability and restore proper header validation in OWA. Administrators should verify that all Exchange servers in their environment are updated and consider temporarily disabling OWA access for non-essential users until patching is complete. Beyond immediate patching, organizations should implement additional email security controls including enhanced monitoring for unusual login patterns following email link clicks and increased user awareness training focused on verifying sender authenticity through alternate channels. Deploy multi-factor authentication across all email access methods to minimize the impact of credential theft. Consider implementing additional email security gateways that perform deep content inspection and sandboxing of suspicious messages before delivery. Security teams should review email logs for indicators of exploitation including messages with unusual header combinations or unexpected sender-recipient patterns that might indicate reconnaissance activity.<\/p>\n<h2>Conclusion<\/h2>\n<p>The active exploitation of CVE-2026-42897 demonstrates how vulnerabilities in widely deployed enterprise software create immediate and widespread risk. Organizations must maintain vigilant patch management practices and layered security controls to protect against evolving email-based threats. Stay protected with CyDhaal. Follow us at cydhaal.com for daily updates.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Critical Exchange Server spoofing flaw under active attack. CVE-2026-42897 affects on-premise versions with CVSS 8.1. Patch immediately if you&#8217;re running 2016\/2019.<\/p>\n","protected":false},"author":1,"featured_media":116,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[14],"tags":[22],"class_list":["post-117","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-vulnerability","tag-cybersecurity-cydhaal-exchangeserver-microsoft-cve-vulnerabilitymanagement"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Exchange Server OWA Spoofing Flaw Actively Exploited - CyDhaal - Your Daily Dose of Cyber Intelligence<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/blog.cydhaal.com\/index.php\/2026\/05\/15\/exchange-server-owa-spoofing-flaw-actively-exploited\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Exchange Server OWA Spoofing Flaw Actively Exploited - CyDhaal - Your Daily Dose of Cyber Intelligence\" \/>\n<meta property=\"og:description\" content=\"Critical Exchange Server spoofing flaw under active attack. CVE-2026-42897 affects on-premise versions with CVSS 8.1. Patch immediately if you&#039;re running 2016\/2019.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/blog.cydhaal.com\/index.php\/2026\/05\/15\/exchange-server-owa-spoofing-flaw-actively-exploited\/\" \/>\n<meta property=\"og:site_name\" content=\"CyDhaal - Your Daily Dose of Cyber Intelligence\" \/>\n<meta property=\"article:published_time\" content=\"2026-05-15T14:02:55+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-05-15T14:57:08+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/blog.cydhaal.com\/wp-content\/uploads\/2026\/05\/cydhaal-36.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1024\" \/>\n\t<meta property=\"og:image:height\" content=\"1024\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"CyDhaal Admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"CyDhaal Admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/blog.cydhaal.com\\\/index.php\\\/2026\\\/05\\\/15\\\/exchange-server-owa-spoofing-flaw-actively-exploited\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/blog.cydhaal.com\\\/index.php\\\/2026\\\/05\\\/15\\\/exchange-server-owa-spoofing-flaw-actively-exploited\\\/\"},\"author\":{\"name\":\"CyDhaal Admin\",\"@id\":\"https:\\\/\\\/blog.cydhaal.com\\\/#\\\/schema\\\/person\\\/0e04b4db0d31604a28212b8978e334e4\"},\"headline\":\"Exchange Server OWA Spoofing Flaw Actively Exploited\",\"datePublished\":\"2026-05-15T14:02:55+00:00\",\"dateModified\":\"2026-05-15T14:57:08+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/blog.cydhaal.com\\\/index.php\\\/2026\\\/05\\\/15\\\/exchange-server-owa-spoofing-flaw-actively-exploited\\\/\"},\"wordCount\":609,\"commentCount\":0,\"image\":{\"@id\":\"https:\\\/\\\/blog.cydhaal.com\\\/index.php\\\/2026\\\/05\\\/15\\\/exchange-server-owa-spoofing-flaw-actively-exploited\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/blog.cydhaal.com\\\/wp-content\\\/uploads\\\/2026\\\/05\\\/cydhaal-36.jpg\",\"keywords\":[\"#cybersecurity #CyDhaal #ExchangeServer #Microsoft #CVE #VulnerabilityManagement\"],\"articleSection\":[\"Vulnerability\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/blog.cydhaal.com\\\/index.php\\\/2026\\\/05\\\/15\\\/exchange-server-owa-spoofing-flaw-actively-exploited\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/blog.cydhaal.com\\\/index.php\\\/2026\\\/05\\\/15\\\/exchange-server-owa-spoofing-flaw-actively-exploited\\\/\",\"url\":\"https:\\\/\\\/blog.cydhaal.com\\\/index.php\\\/2026\\\/05\\\/15\\\/exchange-server-owa-spoofing-flaw-actively-exploited\\\/\",\"name\":\"Exchange Server OWA Spoofing Flaw Actively Exploited - CyDhaal - Your Daily Dose of Cyber Intelligence\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/blog.cydhaal.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/blog.cydhaal.com\\\/index.php\\\/2026\\\/05\\\/15\\\/exchange-server-owa-spoofing-flaw-actively-exploited\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/blog.cydhaal.com\\\/index.php\\\/2026\\\/05\\\/15\\\/exchange-server-owa-spoofing-flaw-actively-exploited\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/blog.cydhaal.com\\\/wp-content\\\/uploads\\\/2026\\\/05\\\/cydhaal-36.jpg\",\"datePublished\":\"2026-05-15T14:02:55+00:00\",\"dateModified\":\"2026-05-15T14:57:08+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/blog.cydhaal.com\\\/#\\\/schema\\\/person\\\/0e04b4db0d31604a28212b8978e334e4\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/blog.cydhaal.com\\\/index.php\\\/2026\\\/05\\\/15\\\/exchange-server-owa-spoofing-flaw-actively-exploited\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/blog.cydhaal.com\\\/index.php\\\/2026\\\/05\\\/15\\\/exchange-server-owa-spoofing-flaw-actively-exploited\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/blog.cydhaal.com\\\/index.php\\\/2026\\\/05\\\/15\\\/exchange-server-owa-spoofing-flaw-actively-exploited\\\/#primaryimage\",\"url\":\"https:\\\/\\\/blog.cydhaal.com\\\/wp-content\\\/uploads\\\/2026\\\/05\\\/cydhaal-36.jpg\",\"contentUrl\":\"https:\\\/\\\/blog.cydhaal.com\\\/wp-content\\\/uploads\\\/2026\\\/05\\\/cydhaal-36.jpg\",\"width\":1024,\"height\":1024},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/blog.cydhaal.com\\\/index.php\\\/2026\\\/05\\\/15\\\/exchange-server-owa-spoofing-flaw-actively-exploited\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/blog.cydhaal.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Exchange Server OWA Spoofing Flaw Actively Exploited\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/blog.cydhaal.com\\\/#website\",\"url\":\"https:\\\/\\\/blog.cydhaal.com\\\/\",\"name\":\"CyDhaal - Your Daily Dose of Cyber Intelligence\",\"description\":\"Daily Cyber Threats. Zero Noise\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/blog.cydhaal.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/blog.cydhaal.com\\\/#\\\/schema\\\/person\\\/0e04b4db0d31604a28212b8978e334e4\",\"name\":\"CyDhaal Admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/e91488823450d58fabed37d4a7c92fb74adfe87dec1074ae7eca410c326b8a01?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/e91488823450d58fabed37d4a7c92fb74adfe87dec1074ae7eca410c326b8a01?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/e91488823450d58fabed37d4a7c92fb74adfe87dec1074ae7eca410c326b8a01?s=96&d=mm&r=g\",\"caption\":\"CyDhaal Admin\"},\"sameAs\":[\"https:\\\/\\\/blog.cydhaal.com\"],\"url\":\"https:\\\/\\\/blog.cydhaal.com\\\/index.php\\\/author\\\/jagsinghcansinghgmail-com\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Exchange Server OWA Spoofing Flaw Actively Exploited - CyDhaal - Your Daily Dose of Cyber Intelligence","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/blog.cydhaal.com\/index.php\/2026\/05\/15\/exchange-server-owa-spoofing-flaw-actively-exploited\/","og_locale":"en_US","og_type":"article","og_title":"Exchange Server OWA Spoofing Flaw Actively Exploited - CyDhaal - Your Daily Dose of Cyber Intelligence","og_description":"Critical Exchange Server spoofing flaw under active attack. CVE-2026-42897 affects on-premise versions with CVSS 8.1. Patch immediately if you're running 2016\/2019.","og_url":"https:\/\/blog.cydhaal.com\/index.php\/2026\/05\/15\/exchange-server-owa-spoofing-flaw-actively-exploited\/","og_site_name":"CyDhaal - Your Daily Dose of Cyber Intelligence","article_published_time":"2026-05-15T14:02:55+00:00","article_modified_time":"2026-05-15T14:57:08+00:00","og_image":[{"width":1024,"height":1024,"url":"https:\/\/blog.cydhaal.com\/wp-content\/uploads\/2026\/05\/cydhaal-36.jpg","type":"image\/jpeg"}],"author":"CyDhaal Admin","twitter_card":"summary_large_image","twitter_misc":{"Written by":"CyDhaal Admin","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/blog.cydhaal.com\/index.php\/2026\/05\/15\/exchange-server-owa-spoofing-flaw-actively-exploited\/#article","isPartOf":{"@id":"https:\/\/blog.cydhaal.com\/index.php\/2026\/05\/15\/exchange-server-owa-spoofing-flaw-actively-exploited\/"},"author":{"name":"CyDhaal Admin","@id":"https:\/\/blog.cydhaal.com\/#\/schema\/person\/0e04b4db0d31604a28212b8978e334e4"},"headline":"Exchange Server OWA Spoofing Flaw Actively Exploited","datePublished":"2026-05-15T14:02:55+00:00","dateModified":"2026-05-15T14:57:08+00:00","mainEntityOfPage":{"@id":"https:\/\/blog.cydhaal.com\/index.php\/2026\/05\/15\/exchange-server-owa-spoofing-flaw-actively-exploited\/"},"wordCount":609,"commentCount":0,"image":{"@id":"https:\/\/blog.cydhaal.com\/index.php\/2026\/05\/15\/exchange-server-owa-spoofing-flaw-actively-exploited\/#primaryimage"},"thumbnailUrl":"https:\/\/blog.cydhaal.com\/wp-content\/uploads\/2026\/05\/cydhaal-36.jpg","keywords":["#cybersecurity #CyDhaal #ExchangeServer #Microsoft #CVE #VulnerabilityManagement"],"articleSection":["Vulnerability"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/blog.cydhaal.com\/index.php\/2026\/05\/15\/exchange-server-owa-spoofing-flaw-actively-exploited\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/blog.cydhaal.com\/index.php\/2026\/05\/15\/exchange-server-owa-spoofing-flaw-actively-exploited\/","url":"https:\/\/blog.cydhaal.com\/index.php\/2026\/05\/15\/exchange-server-owa-spoofing-flaw-actively-exploited\/","name":"Exchange Server OWA Spoofing Flaw Actively Exploited - CyDhaal - Your Daily Dose of Cyber Intelligence","isPartOf":{"@id":"https:\/\/blog.cydhaal.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/blog.cydhaal.com\/index.php\/2026\/05\/15\/exchange-server-owa-spoofing-flaw-actively-exploited\/#primaryimage"},"image":{"@id":"https:\/\/blog.cydhaal.com\/index.php\/2026\/05\/15\/exchange-server-owa-spoofing-flaw-actively-exploited\/#primaryimage"},"thumbnailUrl":"https:\/\/blog.cydhaal.com\/wp-content\/uploads\/2026\/05\/cydhaal-36.jpg","datePublished":"2026-05-15T14:02:55+00:00","dateModified":"2026-05-15T14:57:08+00:00","author":{"@id":"https:\/\/blog.cydhaal.com\/#\/schema\/person\/0e04b4db0d31604a28212b8978e334e4"},"breadcrumb":{"@id":"https:\/\/blog.cydhaal.com\/index.php\/2026\/05\/15\/exchange-server-owa-spoofing-flaw-actively-exploited\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/blog.cydhaal.com\/index.php\/2026\/05\/15\/exchange-server-owa-spoofing-flaw-actively-exploited\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blog.cydhaal.com\/index.php\/2026\/05\/15\/exchange-server-owa-spoofing-flaw-actively-exploited\/#primaryimage","url":"https:\/\/blog.cydhaal.com\/wp-content\/uploads\/2026\/05\/cydhaal-36.jpg","contentUrl":"https:\/\/blog.cydhaal.com\/wp-content\/uploads\/2026\/05\/cydhaal-36.jpg","width":1024,"height":1024},{"@type":"BreadcrumbList","@id":"https:\/\/blog.cydhaal.com\/index.php\/2026\/05\/15\/exchange-server-owa-spoofing-flaw-actively-exploited\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/blog.cydhaal.com\/"},{"@type":"ListItem","position":2,"name":"Exchange Server OWA Spoofing Flaw Actively Exploited"}]},{"@type":"WebSite","@id":"https:\/\/blog.cydhaal.com\/#website","url":"https:\/\/blog.cydhaal.com\/","name":"CyDhaal - Your Daily Dose of Cyber Intelligence","description":"Daily Cyber Threats. Zero Noise","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/blog.cydhaal.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/blog.cydhaal.com\/#\/schema\/person\/0e04b4db0d31604a28212b8978e334e4","name":"CyDhaal Admin","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/e91488823450d58fabed37d4a7c92fb74adfe87dec1074ae7eca410c326b8a01?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/e91488823450d58fabed37d4a7c92fb74adfe87dec1074ae7eca410c326b8a01?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/e91488823450d58fabed37d4a7c92fb74adfe87dec1074ae7eca410c326b8a01?s=96&d=mm&r=g","caption":"CyDhaal Admin"},"sameAs":["https:\/\/blog.cydhaal.com"],"url":"https:\/\/blog.cydhaal.com\/index.php\/author\/jagsinghcansinghgmail-com\/"}]}},"_links":{"self":[{"href":"https:\/\/blog.cydhaal.com\/index.php\/wp-json\/wp\/v2\/posts\/117","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.cydhaal.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.cydhaal.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.cydhaal.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.cydhaal.com\/index.php\/wp-json\/wp\/v2\/comments?post=117"}],"version-history":[{"count":1,"href":"https:\/\/blog.cydhaal.com\/index.php\/wp-json\/wp\/v2\/posts\/117\/revisions"}],"predecessor-version":[{"id":119,"href":"https:\/\/blog.cydhaal.com\/index.php\/wp-json\/wp\/v2\/posts\/117\/revisions\/119"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/blog.cydhaal.com\/index.php\/wp-json\/wp\/v2\/media\/116"}],"wp:attachment":[{"href":"https:\/\/blog.cydhaal.com\/index.php\/wp-json\/wp\/v2\/media?parent=117"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.cydhaal.com\/index.php\/wp-json\/wp\/v2\/categories?post=117"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.cydhaal.com\/index.php\/wp-json\/wp\/v2\/tags?post=117"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}