Due to a security issue in LibreOffice (https://www.heise.de/news/LibreOffice-Falscher-Klick-kann-zur-Ausfuehrung-von-Schadcode-fuehren-9719334.html), I think you (package maintainer of libreoffice-still should quickly update libreoffice-still in the repositories from current version 7.6.6 to new upstrean release 7.6.7 (skipping the "gremlins" phase to give users the version where the security issue is fixed)
that is not an authorative source
there's no CVE or security issue mentioned at https://wiki.documentfoundation.org/Releases/7.6.7/RC1
If you need to be provided information by LibreOffice themselves, then see https://www.libreoffice.org/about-us/security/advisories/CVE-2024-3044:
it's 7.6.6-4 in extra, and the same in galaxy, so at the mo., its up to date following the Arch version as packages generally do. (flagged out of date and 7.6.6-5 is in testing by the looks of it).
According to libreoffice, 7.6.6-x will not fix the issue (except if -4 backports the patch).
Anyway, I think security wise Artix should not only follow but also act by itself (also sometimes other packages are not directly followed).
Now it is at 7.6.7.
This "CVE", which literally reads "Graphic on-click binding allows unchecked script execution", falls into the same category as "I run random bash scripts I download from keygen sites, as root in production servers". Let's not make it such a big deal.