You do not provide enough context.
If you have wireguard traffic leaving the router it has nothing to with going out your WAN on ether1.
In fact, in general, one has no need to specify the WAN interface because we use interface lists
/interface list
add name=LAN
add name=WAN
/interface list memberes
add interface=ether1 list=WAN ( or for pppoe commonly add interface=pppoe-out1 list=WAN.
add interface=bridge list=LAN
Thus, the source nat rule covers this
add chain=srcnat action=masquerade out-interface-list=WAN
+++++++++++++++++++++++++++++++++++++++++
The reason for this rule is so that traffic from all the users on subnets, are given the WANIP of the router out the door to the WWW.
External WWW addresses will respond back to the IP adddress of the router. The router will unsourenat that traffic back to the local IP of the subnet user.
The same COULD be required for users going out the wireguard tunnel. A clue is if your allowed IPs is set to 0.0.0.0/0 and that means.
a. your mikrotik device is a client peer for handshake
b. your mikrotik is being used to go out the internet of the other end of the tunnel, not the internet provided by your local WAN
The question next to be answered is, what is at the other end of the wireguard tunnel aka the Server Peer for handshake device.
a. if its another router, then then there are two options
i. the other end has your local subnets as allowed IPs, and thus masquerade through the tunnel is not required.
ii. the other end does not have your local subnets as allowed IPs, and thus you have to masquerade through the tunnel.
b. if its to a third party VPN provider such as Proton, then it only gives you a single wireguard address and in like a ii. above, it does not know about your local subnets and
thus masquerade through the tunnel is required.
The key point is that the sourcenat rule has NOTHING TO DO with ether1 and would look like.
add chain=srcnat action=masquerade out-interface=wireguard1
|++++++++++++++++++++++++++++++++++++++++++++
Hence, what I often recommend in the scenario of a ii. and b. is to simply use this trick.
/interface list members
add interface=ether1 list=WAN
add interface=bridge list=LAN
add interface=wireguard1 list=WAN
Then you still only need one sourcenat rule.
add chain=srcnat action=masquerade out-interface-list=WAN
In conclusion. Wireguard bound traffic does not go out ether1, it goes out wireguard1 interface.
With that in mind, in the forward chain, one must ensure a rule allowing those supposed to go out the tunnel to have permission to do so…
Remember firewalls do not push traffic anywhere that is the job of routing to select the path.