It's not bad at all.
Practical argument: many implementations calculate $d$ as $e^{-1} \mod \mathrm{lcm}(p-1,q-1)$ (OpenSSL, wolfCrypt, Mbed TLS) or $e^{-1} \mod \mathrm{(p-1)(q-1)}$ (Cryptlib, Nettle). So in practice an adversary can make a good guess anyway.
Meta argument: an RSA private exponent matching the public key $(n,e)$ is any $d$ such that $\forall x, (x^e)^d = x \mod{n}$. Any choice will do — otherwise RSA decryption wouldn't work, since the encryption only depends on $n$ and $e$. So revealing which particular choice of $d$ the private key holder uses does not leak any information about the private key. It only leaks information about how the implementation of the private key operation works.
Mathematical argument: you've picked a private exponent $d = k \, a$ where $a = \mathrm{lcm}(p-1,q-1)$. Suppose the adversary finds the value of $k$, and uses this knowledge to find a candidate private exponent $d'$. The adversary tests their guess by calculating $(x^e)^{d'} \mod{n}$. It doesn't matter whether they found the same private exponent that you're using: that doesn't impact the validation of the guess $d'$, and it doesn't impact the usefulness of knowing $d'$.
The only reason leaking $k$ might matter at all is if there's a side channel in the implementation of the private key operation, and knowing which private exponent is used helps in the exploitation of this side channel. With respect to the mathematical analysis, the affected step is “uses this knowledge to find a candidate private exponent”: if this step uses internal details of your implementation, it could be easier if $k$ is known. This only concerns implementations that use the private exponent: most implementations use the CRT optimization, with exponentiations to the power of $d_P$ and $d_Q$, and the size of those two values is not correlated with the size of $d$ (to make any such correlation, you'd need to know $p$ and $q$, which would be a separate break of its own). A side channel is likely to reveal the approximate size of $d$ anyway. A side channel that leaks some information about $d$ without revealing its size seems far-fetched to me, but I don't have a solid argument that it couldn't happen.