Advisory Date: 2025-11-12
CVE ID: CVE-2025-63680
A path parsing and UI rendering flaw in Nero BackItUp, in combination with Windows ShellExecuteW extension fallback resolution, allows arbitrary code execution when a user clicks a crafted entry in the built-in file browser. By creating a trailing-dot directory and placing a same-basename script file in the same folder, an attacker can make Nero BackItUp display the script as a folder icon and then execute it when the user clicks the entry.
This issue affects recent Nero BackItUp product lines (2019–2025 and earlier, as tested) and has been acknowledged by the vendor.
- CVE ID: CVE-2025-63680
- CWE: CWE-22 – Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
- CVSS v3.1 Score: 8.6 (High)
- Vector:
AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
The following Nero BackItUp product lines are affected (as tested):
- Nero BackItUp – Nero 2025 Productline
- Nero BackItUp – Nero 2024 Productline
- Nero BackItUp – Nero 2023 Productline
- Nero BackItUp – Nero 2022 Productline
- Nero BackItUp – Nero 2021 Productline
- Nero BackItUp – Nero 2020 Productline
- Nero BackItUp – Nero 2019 Productline and earlier (likely affected)
Other versions may also be affected if they share the same file browser implementation.
Nero BackItUp includes a file browser UI that displays folders and files. On Windows, it is possible to create directories with a trailing dot using the \\?\ extended path syntax (for example, demo. ). When a same-basename file such as demo..cmd is placed in the same directory, Nero BackItUp mis-renders the file as a folder icon, effectively spoofing the real object type.
When the user clicks this spoofed entry, Nero BackItUp directly invokes ShellExecuteW on that path. ShellExecuteW follows the Windows PATHEXT fallback order (.COM;.EXE;.BAT;.CMD) when resolving executable files. This causes Windows to execute the attacker's script instead of opening a folder.
This vulnerability is caused by:
- Lack of filtering/normalization of unsafe paths (trailing-dot directories).
- Blind invocation of
ShellExecuteWon user-clicked items.
Combined, these lead to arbitrary code execution in the security context of the current user.
An attacker can exploit this issue via the following steps:
-
Prepare a directory containing:
- A trailing-dot folder (e.g.,
demo.). - A same-basename script file (e.g.,
demo..cmd).
- A trailing-dot folder (e.g.,
-
Convince a victim to open this directory using the Nero BackItUp file browser.
-
Nero BackItUp mis-renders the script file as a folder named
demo. -
When the victim clicks the spoofed folder icon, Nero BackItUp calls
ShellExecuteW. -
ShellExecuteWusesPATHEXTfallback logic and launches the attacker’s script.
User interaction is required (UI:R), but no privileges are required (PR:N).
The following PoC launches Calculator on Windows:
mkdir "\\?\%USERPROFILE%\Desktop\backitup-poc\demo. "
copy nul "\\?\%USERPROFILE%\Desktop\backitup-poc\demo . " >NUL
echo start calc>"\\?\%USERPROFILE%\Desktop\backitup-poc\demo ..cmd"Successful exploitation allows arbitrary code execution as the current user, potentially leading to compromise of user data and backups.