Hi,
Owlready2 currently bundles Pellet with jena-core-2.10.0.jar. This version of Apache Jena is affected by CVE-2021-39239, an XML External Entity (XXE) vulnerability fixed upstream in Jena 4.2.0+.
This shows up as a HIGH-severity finding in container and supply-chain security scanners when Owlready2 is used in production environments.
References:
Would it be possible to:
- Update the bundled Pellet/Jena dependency, or
- Provide a way to disable XML external entity processing.
Happy to help test or validate a fix if needed. Thanks for maintaining Owlready2.