To achieve this I use firewall rules that use the VPN gateway for outgoing traffic. The reason why my NAS's outgoing traffic is not routed through the VPN tunnel is of course, because connection from the WAN to my NAS won't work anymore (I already tested that).
But here is what I want at the same time: When I'm not home and I want to synchronize mit Bitwarden vault with Vaultwarden, hosted in Docker on my NAS in my home LAN, the answer from my NAS should be routed through the default gateway (which is not the VPN tunnel gateway).
Try outbound NAT on the LAN interface for anything coming from "the Internet" towards your NAS.
So it the VPN your default gateway currently and are responses routed to it, even the requests come in on WAN?
And yes, request coming in on WAN, routed through the default gateway don't work.
The LAN rules shouldn't have any impact on traffic coming from WAN.
Do you have floating rules or interface group rules?
You can see the floating rules in the screenshot at the top. They're just the three automatically created entries by the NAT port forwarding rules, as mentioned above.