How can you prevent SQL injection in PHP

To prevent SQL injection in PHP, it is essential to use prepared statements and parameterized queries. These techniques ensure that user input is treated as data, not executable code, which greatly enhances the security of your applications.

Example of Prepared Statements in PHP

<?php // Create a connection $conn = new mysqli("localhost", "username", "password", "database"); // Check the connection if ($conn->connect_error) { die("Connection failed: " . $conn->connect_error); } // Prepare a statement $stmt = $conn->prepare("SELECT * FROM users WHERE email = ?"); // Bind parameters $stmt->bind_param("s", $email); // Set the value of the parameter $email = $_POST['email']; // Execute the statement $stmt->execute(); // Get the result $result = $stmt->get_result(); // Process the results while ($row = $result->fetch_assoc()) { echo "User: " . $row['name'] . "<br>"; } // Close the statement and connection $stmt->close(); $conn->close(); ?>

SQL Injection PHP Security Prepared Statements Parameterized Queries Database Security