Web60 Features
Most WordPress Sites Do Not Break Because of Hackers. They Break Because of Plugin Updates.

The hosting industry has been telling Irish business owners the wrong story for years. The villain is meant to be a hacker. The threat is meant to be a vulnerability. The fix is meant to be a security plugin. None of that matches what shows up in the support logs week after week. A WordPress site goes down. The owner did not get hacked. They pressed Update on a plugin yesterday afternoon and woke up to a white screen this morning.
That is the boring truth nobody puts on a marketing page. Plugin updates break sites more often than hackers ever will. The good news is the fix is technically trivial. The bad news is most hosts do not include it as standard, and the ones that do bury it under terminology designed to make a non-technical customer feel inadequate. Web60 takes a snapshot of your site before the update runs. If the update breaks something, you press one button and the site comes back. That is the entire feature. The reason this article exists is that almost nobody is doing it properly.
The Real Failure Mode Most Hosts Pretend Does Not Exist
A typical WordPress business site has somewhere between 15 and 30 active plugins. Some sites have many more. Each of those plugins is maintained by a different developer, on a different release schedule, with a different idea of what counts as a breaking change. Patchstack's 2025 State of WordPress Security report counted 11,334 new vulnerabilities in the WordPress ecosystem last year, 91% of them in plugins. That is a 42% increase year on year. The weighted median time from disclosure to first exploit attempt was five hours.
What does that mean in practice for the owner of a Limerick accountancy firm running a WordPress site? It means update notifications are not optional. You cannot park them for next month. The same security pressure that drives you to update urgently is also the thing most likely to break your site this afternoon. Plugin conflicts account for roughly half of the white-screen incidents documented in WordPress troubleshooting guides published by Kinsta, Codeable, and others. The other half is split between PHP version mismatches, memory exhaustion, and corrupted update files when a server hangs partway through a transfer.
I have been operating WordPress infrastructure for over twenty years. The pattern is predictable. A business owner presses Update on a WooCommerce extension at three in the afternoon. The plugin pulls in a new version of a library that another plugin still depends on at the old version. The site loads fine. The checkout does not. Nobody notices until a customer rings to ask why the payment page is throwing a JavaScript error. By then the loss is not theoretical. It is leads, baskets, and reputation, all in the same afternoon.
The Industry Standard Is a DevOps Workflow Aimed at Non-DevOps People
If you read what most managed WordPress hosts recommend, the workflow looks reasonable on paper. Clone the production site to a staging environment. Run the plugin update in staging. Verify the checkout works. Verify the contact form sends. Verify nothing visual has shifted. Push to production. Rollback if anything goes wrong.
That is fine if you have a developer on retainer. The problem is the people running most WordPress business sites are not developers. They run a business. They opened the WordPress dashboard because the plugin author said the update was important. They pressed Update because that is the button the platform put in front of them. The notion that a sole trader should clone an environment, run a regression test, and push deploys before clicking a button on their own dashboard is the kind of advice that sounds professional and is, in practice, almost never followed. As I covered in why so many Irish WordPress sites are one auto-update away from breaking, the gap between the recommended workflow and the workflow people actually use is where most outages happen.
I made this mistake myself early on. We recommended a popular page builder update to a client without enforcing the staging workflow. The site lost its layout for the better part of an afternoon while the team scrambled to investigate. We rebuilt our internal process that same week. Nobody should have to learn that lesson twice.
WordPress 6.6 Helped, But Only With Half the Problem
Credit where it is due. WordPress 6.6, released in mid-2024, added automatic rollback for failed plugin auto-updates. The mechanism is sensible. After an auto-update completes, WordPress reactivates the plugin and performs a loopback request to the home page. If a fatal error is detected, the previous version is restored and the site admin gets an email. This was the right move and the WordPress core team deserves credit for shipping it.
The limitation is what it does not catch. A fatal error is a PHP-level crash, the kind that produces a white screen and stops the page rendering at all. That is the easy case. The harder cases are the ones that pass the loopback check and still break the site. A broken WooCommerce checkout. A JavaScript error that stops the contact form from submitting. A layout that has shifted because the plugin author quietly renamed a CSS class. A pricing table now displaying the wrong currency. None of those trigger a fatal error. None of those get rolled back by WordPress 6.6.
This is the gap most platforms hope you do not look at. A site can pass the core rollback check and still be functionally broken at the cash register. The fix requires snapshotting at the hosting layer, not the WordPress layer, because only the hosting layer sees the database state and the file state together as one unit. That is an infrastructure decision, not a plugin choice.
What Proper Managed Hosting Should Do Before an Update Runs
The standard a serious managed WordPress host should hold itself to is straightforward. Before any plugin update, theme update, or core update is applied, take a snapshot of the site at the hosting layer. Retain the snapshot. Make the rollback path a single action the site owner can complete without filing a support ticket or running a command. Apply the same logic to manual updates the owner triggered themselves, not just automatic ones.
This is what Web60 does. The pre-update safety snapshot runs automatically before every plugin update, whether the update was triggered manually from the WordPress dashboard or by the auto-updater overnight. The snapshot covers the WordPress files and the database together, so a rollback restores both in sync. You can also take a manual snapshot at any time from the Web60 dashboard, which is what our own team does before any change we make to a customer site. The rollback is one click. No SSH. No support ticket. No twenty-step recovery procedure pulled from a forum thread at midnight. For the full picture of how this sits inside Web60's wider approach, our complete WordPress security and backup guide for Irish websites walks through the layers end to end.

The Five-Minute Rollback Workflow
When something goes wrong after an update, the panic curve is steep. Owners who have done this before know to stop, take a breath, and follow the steps. Owners who have not done this before tend to start trying random fixes, which usually makes things worse. Here is the workflow we walk customers through.
Recognise the problem. Something on the site looks wrong, will not load, or has stopped working. Note what you last changed before the issue started. Nine times out of ten it is a plugin update from the last few minutes.
Verify the timeline. Open the WordPress dashboard if you can reach it, or the Web60 dashboard if you cannot. Confirm the update happened in the relevant window. This stops you rolling back to a state older than the actual problem.
Rollback to the pre-update snapshot. From the Web60 dashboard, find the snapshot taken just before the update ran. Press Restore. The system captures a fresh snapshot of the current broken state before applying the rollback, in case you change your mind. The rollback typically completes in under a minute on a standard business site.
Verify the recovery. Reload the site in a private browser window. Check the home page, the affected page, and the checkout if you sell online. Click through anything customer-facing. If the issue is gone, the rollback worked. If the issue is still present, the problem was not the update and you have eliminated a variable.
Investigate before retrying. Read the plugin's changelog. Check the plugin support forum. If the new version has known compatibility issues, hold off. If it is a security release you cannot defer, push to a staging environment and verify there before re-running on production.
That is the workflow. It is genuinely five minutes from problem to recovered site, assuming the issue was caused by the update.
What This Approach Does Not Solve
A snapshot is a point in time. Roll back, and anything that happened on the live site between the snapshot and the rollback is at risk. If your shop took fifteen orders in the half hour between updating and rolling back, those orders existed on the live database, not on the snapshot. WooCommerce stores most order data in the database, which the snapshot covers, so rolled-back orders typically come back with the rollback. But payment webhooks, transactional emails, and any external system that fired between the two points may need to be reconciled manually against the gateway logs.
This is the honest limitation. A snapshot is the best recovery tool available for the scenario it is designed for, which is reverting an immediate code change. It is not a replacement for the discipline of testing significant changes in staging first. For most routine plugin updates, the snapshot is enough. For a WooCommerce platform upgrade in the middle of December, staging is the right answer even with snapshots available.

Where Enterprise Hosting Genuinely Does More
There is a category of WordPress workload where the snapshot-and-rollback approach is the floor, not the ceiling. If you run twenty WooCommerce stores serving high-volume transactions, with a dedicated operations team and a release schedule that justifies continuous integration, enterprise managed hosts offer visual regression testing, automated synthetic checkout tests, and multi-environment deployment pipelines. That tooling is worth what it costs at that scale. For a Waterford manufacturer running a single brochure site and a contact form, it is overkill. For an owner-operator running a WordPress site to bring in customers, what matters is the snapshot, the rollback, and the certainty that one wrong update will not cost them a day's work.
The right tool for the workload. Most local firms running a WordPress site are at the workload Web60 is built for, which is exactly why Web60's all-inclusive €60 a year hosting bundles the snapshot, the rollback, free SSL, nightly backups, and the rest of the operational layer at no extra cost.
Closing Thought
Plugin updates will keep breaking sites. The plugin ecosystem will keep getting bigger, the release cadence will keep accelerating, and the security pressure forcing updates will keep increasing. The question is not whether your site will hit a bad update at some point. It will. The question is what your hosting does about it when it happens.
A snapshot taken before the update and a one-click rollback after one buys you the most important thing in this situation, which is time. Time to investigate, time to read the changelog, time to decide whether to retry or wait for a fix. Without that, every plugin update becomes a small bet on your business continuity. With it, an update becomes what it should be. A routine maintenance task with a known recovery path.
Frequently Asked Questions
Does WordPress core not handle this automatically already?
WordPress 6.6 introduced automatic rollback for failed plugin auto-updates, but only when a PHP fatal error is detected. It does not catch broken layouts, JavaScript errors, form submissions that quietly stop working, or WooCommerce checkout problems. Those failures pass the loopback check and still leave the site functionally broken. Hosting-layer snapshots cover the gap the WordPress core feature cannot.
How long does Web60 keep pre-update snapshots?
Pre-update snapshots are retained alongside the nightly backup chain. The exact retention is set by the backup policy on your account, which by default includes nightly snapshots and pre-update safety snapshots accessible from the Web60 dashboard. You can also take manual snapshots at any time and keep them for as long as you need.
What happens to orders or comments submitted between the snapshot and the rollback?
Orders, comments, and form submissions held in the WordPress database during that window are part of the database, which the snapshot covers. Rolling back restores the database to its pre-update state, so anything captured between the two points needs to be reconciled. For most plugin update issues caught within minutes, the window is small. For longer windows, manual reconciliation against payment gateway logs or email confirmations is the safest route.
Should I still use a staging environment if rollbacks are available?
Yes, for significant changes. A snapshot rollback is the right tool when a routine plugin update unexpectedly breaks the site. A staging environment is the right tool when you are deliberately making a change you want to verify first, such as a WooCommerce platform upgrade, a theme change, or a major plugin upgrade. Web60 includes one-click staging alongside the snapshot system, so both are available.
Will the rollback show visitors a broken site while it runs?
The rollback typically completes in under a minute on a standard WordPress business site. During that window, visitors may see a brief maintenance state. For most sites this is faster than the time it would take to investigate a broken update by hand, which is the comparison that matters. The site is also kept on Web60's Irish infrastructure throughout, so there is no DNS change or external dependency in the rollback path.
Sources
Patchstack 2025 State of WordPress Security report, vulnerability counts and exploit timelines
Make WordPress Core, Merge Proposal: Rollback Auto-Update
WordPress 6.6 release documentation
Kinsta, WordPress White Screen of Death troubleshooting and common causes
Codeable, WordPress White Screen of Death causes and quick fixes
Graeme Conkie founded SmartHost in 2020 and has spent years building hosting infrastructure for Irish businesses. He created Web60 after seeing the same problem repeatedly — Irish SMEs paying too much for hosting that underdelivers. He writes about WordPress infrastructure, server security, developer workflows, managed hosting strategy, and the real cost of hosting decisions for Irish business owners.
More by Graeme Conkie →Ready to get your business online?
Describe your business. AI builds your website in 60 seconds.
Build My Website Free →More from the blog
Automatic WordPress Malware Scanning: What It Catches, and What It Will Always Miss
Most WordPress hosts advertise malware scanning but few do it properly. Here is what a real scanner catches, what it misses, and how to tell which one you have.
A Year on Web60: What €60 Actually Bought a Small Irish Business
A composite case study of one Irish small business through twelve months on Web60. What €60 actually included, where it saved money, and what it cannot do.
