How can SQL injection vulnerabilities be mitigated in PHP when inserting data into a database?

SQL injection vulnerabilities can be mitigated in PHP by using prepared statements with parameterized queries. This approach separates the SQL query logic from the user input data, preventing malicious SQL code from being injected into the query.

// Establish a database connection
$pdo = new PDO("mysql:host=localhost;dbname=mydatabase", "username", "password");

// Prepare a SQL statement with a parameterized query
$stmt = $pdo->prepare("INSERT INTO users (username, password) VALUES (:username, :password)");

// Bind the parameters with user input data
$stmt->bindParam(':username', $username);
$stmt->bindParam(':password', $password);

// Execute the prepared statement
$stmt->execute();