diff --git a/docs/codeql/codeql-language-guides/using-flow-labels-for-precise-data-flow-analysis.rst b/docs/codeql/codeql-language-guides/using-flow-labels-for-precise-data-flow-analysis.rst
index 8088d3970be..597ce491463 100644
--- a/docs/codeql/codeql-language-guides/using-flow-labels-for-precise-data-flow-analysis.rst
+++ b/docs/codeql/codeql-language-guides/using-flow-labels-for-precise-data-flow-analysis.rst
@@ -390,7 +390,7 @@ Some of our standard security queries use flow labels. You can look at their imp
to get a feeling for how to use flow labels in practice.
In particular, both of the examples mentioned in the section on limitations of basic data flow above
-are from standard security queries that use flow labels. The `Prototype-pollutiing merge call
+are from standard security queries that use flow labels. The `Prototype-polluting merge call
`_ query uses two flow labels to distinguish completely
tainted objects from partially tainted objects. The `Uncontrolled data used in path expression
`_ query uses four flow labels to track whether a user-controlled