### [CVE-2024-3044](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3044) ![](https://img.shields.io/static/v1?label=Product&message=LibreOffice&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=24.2%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=7.6%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-356%20Product%20UI%20does%20not%20Warn%20User%20of%20Unsafe%20Actions&color=brightgreen) ### Description Unchecked script execution in Graphic on-click binding in affected LibreOffice versions allows an attacker to create a document which without prompt will execute scripts built-into LibreOffice on clicking a graphic. Such scripts were previously deemed trusted but are now deemed untrusted. ### POC #### Reference No PoCs from references. #### Github - https://github.com/Icare1337/LibreOffice_Tips_Bug_Bounty