There is no direct impact, however this information can help an attacker identify other vulnerabilities or help during the exploitation of other identified vulnerabilities.
If it is a file required by the application, change its permissions to prevent public users from accessing it. If it is not, then remove it from the web server.