Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-44085: n/a

0
Medium
VulnerabilityCVE-2024-44085cvecve-2024-44085
Published: Mon Sep 09 2024 (09/09/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

ONLYOFFICE Docs before 8.1.0 allows XSS via a GeneratorFunction Object attack against a macro. This is related to use of an immediately-invoked function expression (IIFE) for a macro. NOTE: this issue exists because of an incorrect fix for CVE-2021-43446 and CVE-2023-50883.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/28/2026, 06:34:19 UTC

Technical Analysis

CVE-2024-44085 is a medium-severity cross-site scripting (XSS) vulnerability identified in ONLYOFFICE Docs versions before 8.1.0. The vulnerability stems from the use of a GeneratorFunction object in conjunction with an immediately-invoked function expression (IIFE) within macros, which allows malicious actors to inject and execute arbitrary JavaScript code in the context of the user’s browser session. This issue is a regression caused by an incorrect remediation of earlier vulnerabilities CVE-2021-43446 and CVE-2023-50883, indicating that the prior fixes did not fully address the underlying problem. The vulnerability is exploitable remotely over the network without requiring authentication, but it does require user interaction, such as opening a malicious document containing the crafted macro. The CVSS 3.1 base score is 6.1, reflecting a network attack vector, low attack complexity, no privileges required, user interaction required, and a scope change with partial impact on confidentiality and integrity but no impact on availability. The vulnerability is categorized under CWE-79 (Improper Neutralization of Input During Web Page Generation), which is a common XSS classification. No public exploits have been reported yet, but the presence of this flaw in a widely used document collaboration platform poses a risk of targeted attacks or phishing campaigns leveraging malicious macros. The lack of an official patch link suggests that users should monitor ONLYOFFICE’s advisories closely and apply updates promptly once released.

Potential Impact

The impact of CVE-2024-44085 on organizations worldwide includes potential unauthorized script execution within the context of ONLYOFFICE Docs users’ browsers. This can lead to partial disclosure of sensitive information (confidentiality impact) and unauthorized modification of document content or session data (integrity impact). While availability is not affected, the ability to execute arbitrary scripts can facilitate further attacks such as session hijacking, credential theft, or lateral movement within an organization’s network. Since the vulnerability requires user interaction, social engineering or phishing campaigns could be used to trick users into opening malicious documents. Organizations relying on ONLYOFFICE Docs for document collaboration, especially those handling sensitive or regulated data, face increased risk of data breaches or compliance violations. The regression nature of this vulnerability also raises concerns about the robustness of the vendor’s patching process, potentially undermining user trust and increasing the likelihood of exploitation once a reliable exploit becomes available.

Mitigation Recommendations

To mitigate CVE-2024-44085, organizations should: 1) Immediately monitor ONLYOFFICE’s official channels for patches or updates addressing this vulnerability and apply them promptly once available, ideally upgrading to version 8.1.0 or later. 2) Implement strict macro security policies, including disabling macros by default and enabling them only from trusted sources. 3) Educate users about the risks of opening documents with macros from untrusted or unknown origins to reduce the likelihood of successful social engineering attacks. 4) Employ web application firewalls (WAFs) or endpoint security solutions capable of detecting and blocking suspicious script execution patterns related to XSS attacks. 5) Conduct regular security audits and penetration testing focused on document collaboration platforms to identify and remediate similar vulnerabilities proactively. 6) Consider network segmentation and least privilege principles to limit the impact of any successful exploitation within the internal environment. 7) Monitor logs and network traffic for unusual activity indicative of exploitation attempts or lateral movement following a compromise.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-08-19T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6cdab7ef31ef0b569914

Added to database: 2/25/2026, 9:42:50 PM

Last enriched: 2/28/2026, 6:34:19 AM

Last updated: 4/12/2026, 8:36:13 AM

Views: 25

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses