Hi @shaunmac, welcome to the forum!
No this flaw can make it possible for an attacker to see the directory structure that’s being hosted as well as what’s outside of that.
An attacker could use a path traversal attack to map URLs to files outside the expected document root
In other words, attackers could have a look at the system’s internal file and directory structure.
Please consider to leave an introduction here so we may get to know you better. Thanks!