diff --git a/src/doc/gallery/curator-permissions.rst b/src/doc/gallery/curator-permissions.rst
index 9f1b3259a23a775f1ed0b9e2faf8fa7a76637a3d..e486f9aa987a072f9b2df8ffbe5ceccf0a4e824c 100644
--- a/src/doc/gallery/curator-permissions.rst
+++ b/src/doc/gallery/curator-permissions.rst
@@ -2,10 +2,10 @@
 Setting permissions for a curator role
 ======================================
 
-The following example shows how to creaate and set permissions for a ``curator``
+The following example shows how to create and set permissions for a ``curator``
 role that is allowed to insert, update, or delete any entity apart from a set of
 RecordTypes and properties that define a "core data model" which can only be
-altered whith administration permissions.
+altered with administration permissions.
 
 In the following, you'll learn how to
 
@@ -43,7 +43,7 @@ this role. Assume you already have created and activated (see
 
 .. note::
 
-   The ``test_curator`` user shouldn't have administration priveleges, otherwise
+   The ``test_curator`` user shouldn't have administration privileges, otherwise
    the below changes won't have any effect.
 
 The core data model and caosdb-advanced-user-tools
@@ -55,7 +55,7 @@ or yaml file (just adapt lines 39-42 accordingly). In this example, we'll use th
 developed b J. Schmidt at the `Leibniz Centre for Tropical Marine Research
 <https://www.leibniz-zmt.de/en/>`_.
 
-Clone the schemas into the same directory containing the below script via
+Clone the schemata into the same directory containing the below script via
 
 .. code:: console
 
@@ -63,7 +63,7 @@ Clone the schemas into the same directory containing the below script via
 
 Furthermore, we'll need the `CaosDB Advanced User Tools
 <https://gitlab.com/caosdb/caosdb-advanced-user-tools>`_ for loading the
-metadata schemas from the json files, so install them via
+metadata schemata from the json files, so install them via
 
 .. code:: console
 
@@ -87,7 +87,7 @@ This means that, by default, all users with the ``curator`` role are **granted**
 all entity permissions (including insert, update, and delete as specified in the
 beginning) **with priority**. This ensures, that no normal user is allowed to
 overrule these permissions (since it is granted with priority), but it can still
-be denied for the core data model entities by a **deny** rule with prioirty. See
+be denied for the core data model entities by a **deny** rule with priority. See
 the server documentation on `permission
 calculation <https://docs.indiscale.com/caosdb-server/permissions.html#permission-calculation>`_
 for more information on which permission rules can or can't be overruled.