diff --git a/rust/ql/src/queries/security/CWE-079/XSS.qhelp b/rust/ql/src/queries/security/CWE-079/XSS.qhelp
index 38c361bd62f..13b7c026f3c 100644
--- a/rust/ql/src/queries/security/CWE-079/XSS.qhelp
+++ b/rust/ql/src/queries/security/CWE-079/XSS.qhelp
@@ -4,8 +4,8 @@
Directly writing user input (for example, an HTTP request parameter) to a web
-page, without properly sanitizing the input first, allows for a cross-site
+ Directly writing user input (for example, an HTTP request parameter) to a webpage,
+without properly sanitizing the input first, allows for a cross-site
scripting vulnerability.
To fix this vulnerability, the user input should be HTML-encoded before being
-included in the response. In the following example encode_text from
+included in the response. In the following example, encode_text from
the html_escape
-crate is used: