On 13 February 2024, Bricks Builder shipped a patch for a critical vulnerability (CVE-2024-25600). By 14 February, active exploitation was already showing up in the logs of affected sites. One day between patch and attack. WordPress maintenance means keeping four layers current: WordPress core, plugins, themes, and security monitoring with backups. Skip that consistently and you eventually become the low-hanging fruit that automated scanners pick first. And yes — you’ve probably had an update break something before. That’s a legitimate concern, and I’ll get to it. Facts first.
What WordPress maintenance actually covers
Four layers, briefly. One: WordPress core, the CMS itself. Two: plugins, the extensions that add functionality. Three: themes, the visual template. Four: security monitoring with backups, so you know what’s happening and can roll back if things go wrong.
Of those four, the plugin layer is the largest attack surface. Patchstack recorded 11,334 new WordPress vulnerabilities in 2025 — 91% in plugins, 9% in themes. WordPress core had six. Six. The problem isn’t WordPress itself; it’s the accumulation of plugins you install and then forget about.
One more uncomfortable number: 46% of vulnerabilities published in 2025 had no patch at the moment of public disclosure. Waiting for an update is not an option in nearly half of all cases — there’s nothing to update to yet. Monitoring and virtual patching become the only line of defence.
The timeline: from CVE disclosure to compromised site
- Hour 0: The CVE goes public. The vulnerability lands in databases like NVD and Patchstack. Security researchers, plugin developers, and attackers all read the same feed at the same moment. The race starts.
- Hours 0–5: Bots sweep the web. Automated tools fingerprint millions of WordPress sites for the version of the vulnerable plugin. The weighted median time to first exploitation in 2025 was five hours. Attackers are scanning and exploiting within the same working day a vulnerability becomes known. Wordfence blocked an average of 215 million exploit attempts per day on protected sites in 2024. That’s the volume your site faces unprotected.
- Day 1: First successful exploits. Not hypothetical. Bricks Builder received a patch for CVE-2024-25600 (CVSS 9.8, remote code execution) on 13 February 2024; Wordfence reported active exploitation on 14 February. Sites that didn’t update within 24 hours were exposed. And 43% of all vulnerabilities require no authentication — an attacker doesn’t need an account to get in.
- Days 2–7: Backdoor or dormant infection. A successful exploit rarely ends with a “HACKED BY” banner in red letters. More often the attacker installs a backdoor and waits. Your site keeps running normally. Meanwhile it can be used as a spam relay, a phishing host, or a jumping-off point toward other sites. Site owners sometimes don’t notice for months.
- Months 1–3: SEO poisoning and performance decay. Injected links to shady pharma or gambling pages damage your domain authority. Google can flag your site as deceptive, and organic traffic collapses. If you want to know whether your domain has already picked up invisible damage, an SEO + GEO audit surfaces exactly those patterns.
- Month 6+: The plugin disappears. Plugin maintenance is a hobby that burns out for many authors. In 2024, 1,614 plugins were removed from the WordPress.org repository for unresolved security issues. If you’re running one of those and it gets pulled, there will never be another patch. The vulnerability becomes permanent — unless you migrate to an alternative or rebuild the functionality elsewhere.
That’s the timeline. Not theoretical. Each stage has a name, a date, a measurable outcome.
The update paradox — and how to solve it
Now the uncomfortable part. Updating is also a risk. On 16 February 2024, WooCommerce documented that version 8.6 broke checkout pages for sites upgrading from 8.5.2. Error: “Cannot read properties of undefined” — right on the Checkout block, right in the middle of a live shop. One day of lost sales costs more than a month of maintenance.
This happens regularly. A plugin update breaks compatibility with another plugin. A theme update overwrites a customisation. A PHP version bump in WooCommerce doesn’t play nicely with an older payment gateway. Non-technical site owners who’ve lived through one of these broken upgrades often avoid updates for years afterward. Understandable. Not sustainable, given the timeline above.
The solution isn’t complicated: staging. I don’t manage a single site without a staging environment. Updates land there first, I click through all the critical flows (checkout, forms, login), and only when those pass does anything go live. If something breaks on staging, I fix it there or report it to the plugin author, and your visitors never see a thing. That’s what WordPress maintenance looks like in practice — not hitting “Update All” on a Friday afternoon.
What recovery costs when things go wrong
Concrete numbers are more useful than abstract warnings. In the Dutch market, MissHack charges €139 excl. VAT for malware removal per WordPress site, or €198 excl. VAT for the combined removal-plus-basic-security package. Internationally, Sucuri’s cleanup subscription runs around $499.99/year, with standalone incident cleanups reaching $500–$800.
Run the numbers. My maintenance rate: €45 per month, or €540 per year — including staging tests, updates, backups, and monitoring. One hack cleanup from a Dutch provider: €139–€198 excl. VAT. Sounds cheaper? That’s before you count hours of downtime, any SEO damage, customer communication, and restoring a clean backup. If the attacker left a dormant backdoor you only catch three months later, you’re cleaning up twice.
Then there’s the compliance angle. GDPR Article 32 requires “appropriate technical and organisational measures” to protect personal data. A WordPress installation with known vulnerabilities that’s been unpatched for months is hard to defend as “appropriate.” I haven’t found a specific enforcement decision targeting neglected CMS maintenance — so I’m not claiming automatic fines — but it’s a trade-off you’re responsible for as a data controller.
Wrap-up
Your site doesn’t need to be impenetrable. It just needs to not be the low-hanging fruit an automated scanner hits first. Five hours between CVE disclosure and first exploitation gives you no time to take a relaxed look on a quiet Saturday — that race is already lost. Testing updates on staging, replacing plugins that disappear from the repository before they become a liability, and keeping a clean backup within reach for when things go wrong anyway: that’s the work. I do it monthly for a handful of WordPress sites, so owners can focus on their business instead of patch notes.