More Growth? > More leads...
We are ready to work with your business and generate some real results…
Let's TalkA Magento store that misses 60 to 90 days of maintenance enters a state where every passing month compounds risk: security patches stack up, performance degrades, and the cost of catching back up grows faster than the cost of staying current. According to Adobe’s security bulletins, Adobe Commerce and Magento Open Source receive security patches every 1 to 3 months on average, and unpatched stores running an out-of-date version are the most common entry point for Magecart-style skimmer attacks documented by Sansec, which scans tens of thousands of stores.
Key Takeaways: Unmaintained Magento stores face four compounding risks: extended downtime, security breaches (especially payment-skimmer attacks documented in Sansec’s threat research), performance degradation that drops Core Web Vitals scores, and runaway repair costs that can exceed £15,000 per major incident. The right baseline maintenance routine is monthly patches, weekly backups, daily monitoring, and a quarterly performance audit. Total cost of clean maintenance: £400 to £1,500 per month depending on store size. Total cost of one unrecovered incident: 10x to 30x that.
What does “neglecting Magento maintenance” actually mean?
Neglecting maintenance is not one thing; it is a pattern of skipped tasks that each individually feels low-priority. The pattern that produces real failures has six components:
- Missed security patches. Adobe releases security bulletins every 1 to 3 months. A store running 6+ months behind on patches is on the wrong side of every disclosed CVE.
- Outdated extensions. Third-party Magento extensions are a primary attack surface. Extensions that have not been updated in 12+ months are the highest risk.
- No active backup. A maintenance-neglected store with a broken backup pipeline cannot recover from a serious incident. Most stores discover the backup is broken at exactly the wrong moment.
- No performance monitoring. Core Web Vitals drift slowly as catalogue grows and code accumulates. Without monitoring, the drift only becomes visible when conversion rates start dropping.
- Untested theme and PHP version updates. Magento depends on specific PHP versions (7.4, 8.1, 8.2, 8.3 depending on Magento release). PHP version end-of-life dates pull stores into mandatory updates whether the team is ready or not.
- No documented runbook for incidents. When something goes wrong, the team that has not practised incident response loses hours figuring out what to check first.
The cost of each individual skip looks small. The cost of all six skipped simultaneously is where stores break.
What is the cost of unpatched Magento in 2026?
The biggest single risk is payment-skimmer (Magecart) attacks. Sansec’s eComscan threat research detects new skimmer campaigns regularly and maintains a public list of Magento vulnerabilities being actively exploited. The pattern that catches stores out:
The five-step Magecart attack chain:
- Attackers scan the public internet for stores running known-vulnerable Magento versions.
- They exploit a disclosed CVE (admin path injection, template injection, or extension vulnerability).
- They inject JavaScript that captures payment card data at checkout.
- The skimmer runs for weeks or months before detection.
- The breach is discovered (often by a customer or bank), triggering PCI compliance violations, customer notifications, and brand damage.
The cost of one undetected skimmer incident:
- Direct legal and compliance. UK ICO and EU GDPR fines for payment-data breaches can reach 4% of global turnover under GDPR Article 83, in addition to PCI-DSS reassessment fees.
- Customer notification and credit monitoring. £5 to £25 per affected customer.
- Forensic investigation and remediation. £15,000 to £100,000+ depending on scope.
- Lost revenue from brand damage. Hard to quantify; usually 6 to 18 months to recover trust.
The baseline maintenance that prevents this: a Magento support team applying security patches within 30 days of release, monitoring for unexpected JavaScript or admin activity, and running periodic penetration tests. The annual cost of that programme is typically £5,000 to £18,000. The cost of one incident is multiples of the entire prevention budget.
What happens to Magento performance over time without maintenance?
Magento performance does not stay constant. It drifts downward as products accumulate, extensions stack, and indexes go stale. Without active maintenance, the drift translates directly to lost revenue.
The four performance drivers that decay without attention:
| Driver | What goes wrong | Revenue impact |
|---|---|---|
| Core Web Vitals (LCP, INP, CLS) | Page load slows as catalogue grows; INP degrades with JS bloat | Google ranking decline, organic traffic loss |
| Magento index health | Stock, price, category indexes need regular reindexing | Wrong stock counts, broken category pages |
| Image and asset optimisation | Unoptimised product images bloat page weight | Mobile bounce rate climbs |
| Database query performance | Slow queries accumulate; checkout abandons rise | Direct conversion loss |
Google’s mobile speed research found bounce probability jumps 32% when load time goes from 1 to 3 seconds. For a £1M annual revenue store, a 10% bounce rate increase from performance drift costs roughly £80,000 to £120,000 per year in foregone revenue.
Active performance maintenance includes monthly Lighthouse audits, quarterly database optimisation, image-format updates (WebP, AVIF), and CDN cache tuning. The annual cost is small relative to the revenue at risk.
What is the realistic cost of a clean Magento maintenance programme?
Pricing varies by store size and complexity, but the bands are consistent. Adobe’s Commerce Cloud documentation and practitioner reports converge on the following:
UK Magento maintenance retainer ranges by store size:
| Store profile | Monthly maintenance cost | What it covers |
|---|---|---|
| Small store (1 to 5k SKUs, <£200k revenue) | £300 to £700 | Patches, backups, monitoring, ad-hoc fixes |
| Mid-market (5k to 50k SKUs, £200k to £2M revenue) | £700 to £1,800 | All above plus performance tuning, extension updates, monthly reports |
| Enterprise (50k+ SKUs, B2B features, multi-store) | £1,800 to £5,000+ | Dedicated team, monthly reviews, advanced monitoring, SLA |
| Adobe Commerce Cloud (managed hosting) | Included in licence | Adobe-managed infrastructure; site-level patching still needed |
What the cost includes for a well-run programme:
- Monthly security patches applied to development, tested, deployed to production.
- Weekly backups with quarterly recovery tests (untested backups are not backups).
- Daily monitoring for uptime, performance, security alerts.
- Quarterly performance audit with prioritised fix list.
- Annual extension audit to retire unmaintained third-party code.
- Incident response runbook with on-call paths.
Stores that skip the £400 to £1,500 per month spend usually pay 10x to 30x that amount in one incident. The maths is rarely close.
What happens when stores try to skip maintenance and catch up later?
The “we’ll do a big maintenance push next quarter” approach almost always costs more than continuous maintenance. Three reasons:
- Patches do not stack cleanly. Magento patches build on each other. Trying to apply 12 months of patches in one batch produces conflicts that require senior developer time to resolve.
- Extension compatibility breaks. Old extensions that worked on Magento 2.4.3 may not work on 2.4.7. Catching up means either updating extensions (extra cost) or rebuilding the functionality custom (much extra cost).
- PHP version end-of-life forces emergency upgrades. PHP 7.4 reached end-of-life in November 2022; 8.1 reached end of active support; 8.2 is current; 8.3 is the next major. A store stuck on an unsupported PHP version is at risk for security and for plugin compatibility.
The catch-up project pattern that breaks budgets:
- Store skips maintenance for 12 to 18 months to save money.
- Discovers a security disclosure forcing an immediate patch.
- Patch requires a Magento version upgrade.
- Upgrade breaks three extensions, one custom integration.
- Total catch-up cost: £15,000 to £60,000 in dev time over 4 to 8 weeks.
The continuous-maintenance alternative would have cost £6,000 to £20,000 over the same 12 to 18 months and produced zero emergencies.
How do you choose a Magento maintenance provider?
The right provider is one that understands Magento specifically. Five criteria worth screening for:
- Magento certifications and direct experience. Adobe Commerce certifications are useful signals. Years of actual Magento store maintenance matter more.
- Documented runbook and incident response process. Ask to see the playbook the team would follow if your store had a Magecart incident on Friday at 5pm.
- Real-time monitoring tooling. Magento-aware monitoring (New Relic, Sentry, Sansec’s eComscan) is the baseline. Generic uptime monitoring is not enough.
- Clear patching SLA. The contract should specify how quickly security patches are applied to your environment (30 days from Adobe release is a reasonable standard).
- Recovery experience. Has the provider recovered a store from a breach? Reference checks should confirm this directly, not just “we have happy clients.”
Red flags worth walking away from:
- “We monitor your site” with no specifics about what is monitored.
- Reluctance to share monitoring dashboard access.
- No documented backup recovery test cadence.
- No specific patching SLA in the contract.
- No incident response runbook to review.
The 60-day pilot is the right way to evaluate a new provider: real work for 60 days, then commit or move on. Long-term contracts before evaluating actual delivery favour the provider, not the merchant.
How does Adobe Commerce as a Cloud Service change the maintenance picture?
Adobe’s Commerce as a Cloud Service launched in 2024 and changes who is responsible for what. For stores on this product:
- Adobe-managed infrastructure. OS patches, server software, CDN, scaling all handled by Adobe. The merchant is not responsible for these.
- Application patches. Still the merchant’s responsibility (or the agency’s). Adobe Commerce code-level patches need to be applied to the store.
- Extensions and customisations. Still the merchant’s responsibility. Custom code on top of Commerce is the most common breakage point.
- Performance tuning. Shared responsibility: Adobe handles infrastructure performance; the merchant handles store-level optimisation.
The model reduces the operational surface area without eliminating maintenance. Stores still need active patch management, extension review, and performance monitoring. The bill is split between Adobe (infrastructure) and the agency or in-house team (application).
Stores on Magento Open Source self-hosted have the full operational burden and the largest maintenance cost. Adobe Commerce on-premise sits between. The decision between hosting models is partly a maintenance-cost decision.
Frequently asked questions
Can a small Magento store skip maintenance to save money?
No, not safely. Even a small store running Magento Open Source is exposed to the same security risks as a larger one. The right cost reduction is to move to a managed hosting platform (Adobe Commerce Cloud, or a specialist Magento host like Cloudways or Hyvä). It is not to skip maintenance.
How quickly should security patches be applied?
Within 30 days of Adobe’s release for routine patches; within 7 days for actively exploited CVEs (Adobe marks these as critical in security bulletins). Stores delaying patches past 30 days are at materially higher risk than those staying current.
What is the difference between Magento maintenance and Magento support?
Maintenance is the proactive work (patches, backups, monitoring, performance tuning). Support is the reactive work (fixing things that break). A good provider includes both in a retainer. A provider offering only “support” usually means break-fix only, which leaves the maintenance gap unfilled.
What is Magecart and why is it a Magento-specific risk?
Magecart is a class of attack that injects payment-card skimmers into eCommerce checkouts. It is not Magento-exclusive; WooCommerce, Shopify-via-third-party-apps, and custom stores are also targets. Magento is heavily targeted because of its market share in mid-market commerce and the consistency of its admin patterns. Sansec’s threat research documents active campaigns.
Should a small store consider migrating off Magento to reduce maintenance burden?
For stores under 5,000 SKUs without complex catalogue, B2B features, or multi-store needs, the migration question is worth asking. Shopify, BigCommerce, and WooCommerce each have lower maintenance burden than Magento Open Source. The migration cost is real (typically £15,000 to £80,000 for a clean replatform), but the ongoing savings can pay back in 12 to 24 months.
What this means in practice
Magento maintenance is not optional, and the cost calculation almost always favours continuous maintenance over delayed catch-up. The annual spend for a clean programme is small (£5,000 to £18,000 for mid-market) compared with the cost of one Magecart incident, one major upgrade scramble, or one PHP end-of-life emergency. Pick a provider with documented runbooks, Magento certifications, and a clear patching SLA. Run a 60-day pilot before committing long-term. And if the store no longer needs Magento’s depth, treat the maintenance overhead as a signal to evaluate replatform.
For related reading, see our guides on the pros and cons of Magento, the essential elements of eCommerce web design, and our services overview.
More Growth? > More leads...
We are ready to work with your business and generate some real results…
Let's TalkJoin Our Community: Subscribe for Updates
Get notified of the best deals on our WordPress themes.