What do your firewall rules on WAN look like? You did create a rule to allow the WG traffic to pass?
Rules look good.I'd do a tcpdump on WAN to watch if packets from the client arrive at all.
root@OPNsense:~ # tcpdump -ni pppoe0 port 51820tcpdump: verbose output suppressed, use -v or -vv for full protocol decodelistening on pppoe0, link-type NULL (BSD loopback), capture size 262144 bytes12:07:26.137477 IP xxx.xxx.125.156.32611 > 176.100.43.99.51820: UDP, length 10412:07:26.138099 IP xxx.xxx.125.156.15678 > 45.134.79.164.51820: UDP, length 10412:07:47.270672 IP 176.100.43.99.51820 > xxx.xxx.125.156.50000: UDP, length 10412:07:47.350462 IP 176.100.43.99.51820 > xxx.xxx.125.156.50000: UDP, length 10412:07:48.503440 IP 176.100.43.99.51820 > xxx.xxx.125.156.50000: UDP, length 10412:07:51.567716 IP 199.116.118.230.51820 > xxx.xxx.125.156.50000: UDP, length 10412:07:52.067593 IP xxx.xxx.125.156.33657 > 45.134.79.134.51820: UDP, length 10412:08:05.209076 IP xxx.xxx.125.156.54695 > 45.134.79.159.51820: UDP, length 10412:08:05.212933 IP xxx.xxx.125.156.24112 > 45.134.79.144.51820: UDP, length 10412:08:05.212939 IP xxx.xxx.125.156.33657 > 45.134.79.134.51820: UDP, length 10412:08:09.185267 IP xxx.xxx.125.156.13597 > 45.134.79.157.51820: Flags [S], seq 1011473637, win 42340, options [mss 1460,sackOK,TS val 2411564351 ecr 0,nop,wscale 9], length 012:08:09.213729 IP xxx.xxx.125.156.64473 > 146.70.211.145.51820: UDP, length 10412:08:10.193015 IP xxx.xxx.125.156.13597 > 45.134.79.157.51820: Flags [S], seq 1011473637, win 42340, options [mss 1460,sackOK,TS val 2411565359 ecr 0,nop,wscale 9], length 012:08:12.241380 IP xxx.xxx.125.156.13597 > 45.134.79.157.51820: Flags [S], seq 1011473637, win 42340, options [mss 1460,sackOK,TS val 2411567407 ecr 0,nop,wscale 9], length 012:08:12.727806 IP xxx.xxx.125.156.31549 > 45.134.79.132.51820: UDP, length 10412:08:12.727940 IP xxx.xxx.125.156.31074 > 45.134.79.147.51820: UDP, length 10412:08:12.728195 IP xxx.xxx.125.156.56893 > 45.134.79.157.51820: UDP, length 10412:08:16.273197 IP xxx.xxx.125.156.13597 > 45.134.79.157.51820: Flags [S], seq 1011473637, win 42340, options [mss 1460,sackOK,TS val 2411571439 ecr 0,nop,wscale 9], length 012:08:19.070671 IP xxx.xxx.125.156.20282 > 45.134.79.167.51820: UDP, length 10412:08:20.353800 IP 199.116.118.230.51820 > xxx.xxx.125.156.50000: UDP, length 10412:08:24.465108 IP xxx.xxx.125.156.13597 > 45.134.79.157.51820: Flags [S], seq 1011473637, win 42340, options [mss 1460,sackOK,TS val 2411579631 ecr 0,nop,wscale 9], length 012:08:25.228771 IP xxx.xxx.125.156.18230 > 149.22.94.65.51820: UDP, length 10412:08:30.689220 IP xxx.xxx.125.156.61161 > 149.102.252.46.51820: UDP, length 104^C23 packets captured268461 packets received by filter0 packets dropped by kernel