0.0.0.0/0 tells WG to allow all networks and make the WG link your default gateway (0.0.0.0/0). Allowed Networks 0.0.0.0/0 should only be used if you want all traffic to go through the WG interface, which it seems like you don't want to occur.
.
I am not seeing this (WG becoming the default link if you use 0.0.0.0/0). I have a lot of WireGuard networks all using OSPF between a lot of sites. I have never seen this routing change.
For me simply 0.0.0.0/0 just allows all traffic to traverse the WG link, if I route it to do so. I have hundreds of wireguard tunnels and have never seen 0.0.0.0/0 in the wireguard config create a default route.
I am now nervous that IF this does start happening as you say I am going to have a lot of broken networks.
simple example of one of my configs.
/interface wireguard
add listen-port=13238 mtu=1420 name=wireguard-core
/interface wireguard peers
add allowed-address=0.0.0.0/0 endpoint-address=119.1.1.1 endpoint-port=\
13238 interface=wireguard-core persistent-keepalive=30s public-key=\
"6l7XP/CXXXXXXXXXXXXXXXXXXXXGB2jh0="
routing ospf instance
add disabled=no name=default-v2 router-id=10.255.255.11
/routing ospf area
add disabled=no instance=default-v2 name=backbone-v2
/routing ospf interface-template
add area=backbone-v2 disabled=no interfaces=bridge-local
add area=backbone-v2 cost=5 disabled=no interfaces=wireguard-core
type=ptp
add area=backbone-v2 disabled=no interfaces=ether2