diff --git a/reference/pcre/pattern.modifiers.xml b/reference/pcre/pattern.modifiers.xml
index 057ea80b03..048601edc7 100644
--- a/reference/pcre/pattern.modifiers.xml
+++ b/reference/pcre/pattern.modifiers.xml
@@ -127,7 +127,7 @@ $html = preg_replace(
The above example code can be easily exploited by passing in a string such as
<h1>{${eval($_GET[php_code])}}</h1>. This gives
- the attacker the ability to execute arbitrary PHP code and as such gives him
+ the attacker the ability to execute arbitrary PHP code and as such gives them
nearly complete access to your server.