diff --git a/ webgoat/main/project/WebContent/lesson_plans/HttpSplitting.html b/ webgoat/main/project/WebContent/lesson_plans/HttpSplitting.html
index 404d14bc5..46caba040 100644
--- a/ webgoat/main/project/WebContent/lesson_plans/HttpSplitting.html
+++ b/ webgoat/main/project/WebContent/lesson_plans/HttpSplitting.html
@@ -20,6 +20,6 @@ but also allows them to create additional responses entirely under their control
* Enter a language for the system to search by.
* You notice that the application is redirecting your request to another resource on the server.
* You should be able to use the CR (%0d) and LF (%0a) to exploit the attack.
-* Your excercise should be to force the server to send a 200 OK.
+* Your excercise should be to force the server to send a 200 OK.
* If the screen changed as an effect to your attack, just go back to the homepage where you will find the lesson completed if you successfully exploited the attack.