I use WireGuard personally. OpenVPN has been around a long time, and is very configurable. That can be a benefit if you need some specific configuration, but it can also mean more opportunities to configure your connection in a less-secure way (e.g. selecting on older, less strong encryption algorithm). WireGuard is much newer and supports fewer options. For example it only does one encryption algorithm, but it's one of the latest and most secure. WireGuard also tends to have faster transfer speeds, I believe because many of OpenVPN's design choices were made long ago. Those design choices made sense for the processors available at the time, but simply aren't as performant on modern multi core CPUs. WireGuard's more recent design does a better job of taking advantage of modern processors so it tends to win speed benchmarks by a significant margin. That's the primary reason I went with WireGuard.
In terms of vulnerabilities, it's tough to say which is better. OpenVPN has the longer track record of course, but its code base is an order of magnitude larger than WireGuard's. More eyes have been looking at OpenVPN's code for more time, but there's more than 10x more OpenVPN code to look at. My personal feeling is that a leaner codebase is generally better for security, simply because there's fewer lines of code in which vulnerabilities can lurk.
If you do opt for OpenVPN, I believe UDP is generally better for performance. TCP support is mainly there for scenarios where UDP is blocked, or on dodgy connections where TCP's more proactive handling of dropped packets can reduce the time before a lost packet gets retransmitted.