article featured image


Click and execute! A new vulnerability in the open-source LibreOffice is being exploited by threat actors. As per reports, attackers can run malicious code on victims by deceiving them into opening and clicking on a maliciously crafted document.

The LibreOffice developers warn users in a security advisory that the office software supports linking scripts to click events on graphics.

For affected versions of LibreOffice, there are scenarios in which embedded scripts are executed without warning when users click on a document with such on-click handlers.

LibreOffice Security Advisory (Source)

What to Know About the Vulnerability

Registered as CVE-2024-3044, the vulnerability scored 8.8 on the CVSS scale, just short of critical, indicating a ‘high risk’ of exploitation potential.

Such scripts were classified as being trustworthy in the early versions of LibreOffice, but that is no longer the case. The bug has already received a fix. The fix ensures that the rights granted by users to execute macros assigned when loading a page are now also applied to on-click handlers.

patch management free demo

LibreOffice developers recommend patching the software to the newest version. Version 23.2.3 and 7.6.7 of the software are available for download on the project’s download page.

For Linux users it is recommended to start their software management and check whether the bug-fixed versions have already been installed.

About a year ago, the Ghostscript package created a security vulnerability in various software installations, including LibreOffice, which has the tool integrated. This vulnerability could be exploited by opening manipulated documents.

If you liked this piece, check out the Heimdal Blog for more! Follow us on LinkedInTwitterFacebook, and YouTube for more cybersecurity news and topics.

Author Profile

Cristian Neagu


linkedin icon

Cristian is a Content Editor & Creator at Heimdal®, where he developed a deep understanding of the digital threat landscape. His style resonates with both technical and non-technical readers, proof being in his skill of communicating cybersecurity norms effectively, in an easy-to-understand manner.

Leave a Reply

Your email address will not be published. Required fields are marked *