An unauthorized user could be able to read any file on the system, potentially exposing sensitive information.